Solving HCL 7.1.59 installation error

I was encounter below error message when I tried to install HP Comware simulator (H3C cloud Lab).

"The virtualbox version is lower than the HCL needed."

My PC was installed with Virtualbox Version 5.0.16 and it is latest when I am writing this post.

Below is the resolve method to skip this error.

You just open registry editor and go to HKEY_LOCAL_MACHINE>SOFTWARE>Oracle>Virtualbox.
Then change the Data Value of Version and VersionExt to 4.2.18 and try to reinstall Simulator.
You will see no more error while installing it.
Do not forget to revert to correct version data value in registry value after Simulator installation done.

Have a good time.
(Be knowledgeable, pass it on then)

Jigsaw Ransomware spotted in the wild

The Dell SonicWall Threats Research team has received reports of a new Ransomware Trojan, Jigsaw (named after the fictional character) which encrypts the system files and also deletes them if the payment is not made on time.
Infection cycle:
The Trojan poses as firefox with the following properties:
The Trojan adds the following files to the filesystem:
  • %APPDATA%\Roaming\Frfx\firefox.exe (copy of original) [Detected as GAV: Jigsaw.A (Trojan)]

The Trojan creates the following key to the Windows registry to enable startup after reboot:
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run ""%APPDATA%\Roaming\Frfx\firefox.exe""

It displays the following iconic image and the message while encrypting the files:
It starts countdown and threatens to delete the files mentioned each hour.
The trojan finds the following files on the victim's machine and encrypts them:
It copies the filenames before encrypting at the following location:
It encrypts all the victims files listed above with .fun extension.
When trying to close the ransom window, it displays the following message:
It checks for the payment contacting the C&C server:

It's time to update your security devices to avoid this kind of trojan.
Have  a good time.
(Be knowledgeable, pass it on then)

Badlock: Windows SAM and LSAD Downgrade Vulnerability

An elevation of privilege vulnerability exists in the Security Account Manager (SAM) and Local Security Authority (Domain Policy) (LSAD) remote protocols. Microsoft and SAMBA are vulnerable to these attacks. The vulnerability is triggered when these protocols accept authentication levels that do not protect them adequately. It is caused by the way the SAM and LSAD remote protocols establish the Remote Procedure Call (RPC) channel. An attacker who successfully exploited this vulnerability could gain access to the SAM database. To exploit the vulnerability, an attacker could launch a man-in-the-middle (MiTM) attack, force a downgrade of the authentication level of the SAM and LSAD channels, and then impersonate an authenticated user. The attacker can access domain passwords as well. The security update addresses the vulnerability by modifying how the SAM and LSAD remote protocols handle authentication levels.
There are two different CVE identifiers associated with this vulnerability:
  • Microsoft: CVE-2016-0128
  • SAMBA: CVE-2016-2118
In addition to this, the vulnerability has been known by 'badlock'.
Microsoft has two protocols that are vulnerable to this attack:
  • Security Account Manager Remote Protocol(SAMR): This protocol provides management functionality for user account store and for user/group directries.
  • Local Security Authority (LSAD): This protocol provides management functionality for user account store and for user/group directries.
These protocols manintain security account manager database. They are supported by both Windows and Samba and they support all domain profiles.
In addition to these, SAMBA's following protocols are susceptible to this vulnerability:
  • Directory Replication Service Remote Protocol (DRSR): RPC protocol for replication and management of data in Active Directory
  • BackupKey Remote Protocol (BKRP): Encrypts and decrypts sensitive data (such as cryptographic keys)
Please patch your security systems (Gateway or Endpoint) to the latest one to prevent from this vulnerability.

Have a good time.

(Be knowledgeable, pass it on then)