Write the reason you're deleting this FAQ
So I flicked over to the news earlier and there was this report about GP's and hospitals being hit by a massive wave of ransomware. And it's a major thing as well as NHS hospitals in England and Scotland have been hit and affected by it. To the point that hospitals can't access patients details and some people have had to have important operations cancelled because of it. One guy was booked in to have a heart bypass operation that is very serious and it had to be cancelled. He was literally about to go in and they had to cancel on him due to not being able to access his details.
And I just thought, oh well that's quite bad I hope they get to sort it out soon. And I started to think about how a computer could become infected with ransomware and I thought, that's just like anything. Never open suspicious emails, don't click on unknown links, don't download and install questionable software that kind of thing.
Then I go to login to my VPS, to check how some of my campaigns are running. And then what do I see? That the background has been changed and there's a program running telling my my important files have been encrypted and I need to pay to have them decrypted.
Here's a screenshot of what I see on my VPS.

Now I'm not at worried about this as it's only a VPS and I don't have any files on it. I only have my software running on it and that's it. So obviously I'm not going to pay anything. I can just ignore it and carry on without it affecting me in any way.
I would dread to think what it must be like to actually have this ransomware infect your main PC though! And I think the only thing you could really do is to format your disc and reinstall a fresh Windows install on it.
This is just another reason (next to HDD crashing) why you need to have a backup for all of your important files. That way if it does happen you can just reinstall Windows.
I don't know how on earth my VPS became infected though. I don't think I've even opened IE on it. I can only assume that it was probed and then a vulnerability (hole) was found and they got in that way. And that's probably how it's happened for all the other PC's that have become infected by this ransomware.
Fancy targeting hospitals though. That's playing with peoples lives man.
Have you been hit by this ransomware?
What do you think of it?
Are you sure you want to delete this post?
Are you sure you want to delete this post?
Are you sure you want to delete this post?
Are you sure you want to delete this post?
| Match | Count | SQL | Script |
| SELECT * FROM `questions` as q JOIN categories_faq as c ON q.catid=c.CATID WHERE (q.status=1 OR (q.status=2 AND userid='') ) AND q.quesid='22556' | 1 | SELECT q.*, c.seo as CatSEO, c.name as CatName, c.parentid
FROM `questions` as q
JOIN categories_faq as c ON q.catid=c.CATID
WHERE (q.status=1 OR
(q.status=2 AND userid='')
)
AND q.quesid='22556' | /opt/clerks-staging/docroot/viewfaq.php 496 () () |
| SELECT * FROM seoclerks.members WHERE USERID='272' | 1 | SELECT * FROM seoclerks.members WHERE USERID='272' | /opt/clerks-staging/docroot/include/functions/includes/member.php 445 GetAllUserDetails() () |
| SELECT * FROM categories_faq WHERE CATID='55' | 1 | SELECT CATID, seo, name, metatitle, h2header, metakeywords, metadescription, metaheader, parentid, image_name FROM categories_faq WHERE CATID='55' | /opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() GetCategorySeoFromType() |
| SELECT * FROM seoclerks.members WHERE USERID=272 | 1 | SELECT googleplus_profile FROM seoclerks.members WHERE USERID=272 | /opt/clerks-staging/docroot/include/functions/main.php 16914 GetGooglePlusProfileFromId() () |
| SELECT * FROM ratings_faq as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=22556 LIMIT 5 | 1 | SELECT m.username FROM
ratings_faq as r,
seoclerks.members as m
WHERE r.USERID=m.USERID
AND r.upvote=1
AND r.PID=22556
LIMIT 5 | /opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() () |
| SELECT * FROM answers a, seoclerks.members b WHERE a.quesid='22556' AND a.userid=b.USERID and b.status='1' AND a.status=1 ORDER BY a.combined_votes DESC, a.date_answered asc | 1 | SELECT a.answer, a.USERID, a.upvotes, a.downvotes, a.ansid, a.parentid, a.combined_votes, a.date_answered,
b.username, b.userlevel, b.profilepicture FROM answers a, seoclerks.members b
WHERE a.quesid='22556' AND a.userid=b.USERID and b.status='1' AND a.status=1
ORDER BY a.combined_votes DESC, a.date_answered asc | /opt/clerks-staging/docroot/viewfaq.php 1245 () () |
| SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=116983 LIMIT 5 | 1 | SELECT m.username FROM
ratings_faqanswers as r,
seoclerks.members as m
WHERE r.USERID=m.USERID
AND r.upvote=1
AND r.PID=116983
LIMIT 5 | /opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() () |
| SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=116991 LIMIT 5 | 1 | SELECT m.username FROM
ratings_faqanswers as r,
seoclerks.members as m
WHERE r.USERID=m.USERID
AND r.upvote=1
AND r.PID=116991
LIMIT 5 | /opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() () |
| SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=117026 LIMIT 5 | 1 | SELECT m.username FROM
ratings_faqanswers as r,
seoclerks.members as m
WHERE r.USERID=m.USERID
AND r.upvote=1
AND r.PID=117026
LIMIT 5 | /opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() () |
| SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=117028 LIMIT 5 | 1 | SELECT m.username FROM
ratings_faqanswers as r,
seoclerks.members as m
WHERE r.USERID=m.USERID
AND r.upvote=1
AND r.PID=117028
LIMIT 5 | /opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() () |
| SELECT * FROM ratings_faqanswers as r, seoclerks.members as m WHERE r.USERID=m.USERID AND r.upvote=1 AND r.PID=189786 LIMIT 5 | 1 | SELECT m.username FROM
ratings_faqanswers as r,
seoclerks.members as m
WHERE r.USERID=m.USERID
AND r.upvote=1
AND r.PID=189786
LIMIT 5 | /opt/clerks-staging/docroot/include/functions/main.php 17159 GetVoters() () |
| UPDATE questions SET total_views = total_views + 1 WHERE quesid='22556' | 1 | UPDATE questions SET total_views = total_views + 1 WHERE quesid='22556' | /opt/clerks-staging/docroot/include/functions/main.php 1765 update_Faqviewcount() () |
| SELECT * FROM questions WHERE quesid!='22556' AND status='1' AND (question like '%NHS cyber attack: GPs hospitals hit ransomware%' OR question like '%cyber%' OR question like '%attack:%' OR question like '%hospitals%' OR question like '%ransomware%') -- ORDER BY RAND() LIMIT 15 | 1 | SELECT quesid, question, seo, userid
FROM questions
WHERE quesid!='22556' AND status='1'
AND (question like '%NHS cyber attack: GPs hospitals hit ransomware%' OR question like '%cyber%' OR question like '%attack:%' OR question like '%hospitals%' OR question like '%ransomware%')
-- ORDER BY RAND()
LIMIT 15 | /opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() () |
| SELECT * FROM seoclerks.members WHERE USERID='147' limit 1 | 1 | SELECT profilepicture FROM seoclerks.members WHERE USERID='147' limit 1 | /opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_get_member_profilepicture() |
| SELECT * FROM seoclerks.members WHERE USERID='59594' limit 1 | 1 | SELECT profilepicture FROM seoclerks.members WHERE USERID='59594' limit 1 | /opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_get_member_profilepicture() |
| SELECT * FROM seoclerks.members WHERE USERID='19821' limit 1 | 1 | SELECT profilepicture FROM seoclerks.members WHERE USERID='19821' limit 1 | /opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_get_member_profilepicture() |
| SELECT * FROM seoclerks.members WHERE USERID='254580' limit 1 | 1 | SELECT profilepicture FROM seoclerks.members WHERE USERID='254580' limit 1 | /opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_get_member_profilepicture() |
| SELECT * FROM members_ledger WHERE script='/opt/clerks-staging/docroot/viewfaq.php' AND querystring LIKE '%id=22556%' AND added>=UNIX_TIMESTAMP(NOW())-1200 GROUP BY USERID | 1 | SELECT USERID, username FROM members_ledger
WHERE script='/opt/clerks-staging/docroot/viewfaq.php'
AND querystring LIKE '%id=22556%'
AND added>=UNIX_TIMESTAMP(NOW())-1200
GROUP BY USERID
| /opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() () |
| SELECT * FROM categories | 1 | SELECT * FROM categories | /opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() parseRedundantQueriesCache() |
| select * from categories_software order by name asc | 1 | select * from categories_software order by name asc | /opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_GetSoftwareCategories() |
| select * from categories_wanttobuy order by name asc | 1 | select * from categories_wanttobuy order by name asc | /opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_get_wantcategories() |
| select * from categories_wanttotrade order by name asc | 1 | select * from categories_wanttotrade order by name asc | /opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_get_tradecategories() |
| SELECT * FROM seoclerks.members WHERE USERID='65703.jpg' | 1 | SELECT profilepicture FROM seoclerks.members WHERE USERID='65703.jpg' | /opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() getUserProfileImage() |
| SELECT * FROM seoclerks.members WHERE USERID='586511.jpg' | 1 | SELECT profilepicture FROM seoclerks.members WHERE USERID='586511.jpg' | /opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() getUserProfileImage() |
| SELECT * FROM seoclerks.members WHERE USERID='272.jpg' | 1 | SELECT profilepicture FROM seoclerks.members WHERE USERID='272.jpg' | /opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() getUserProfileImage() |
| select * from categories_faq order by name asc | 1 | select * from categories_faq order by name asc | /opt/clerks-staging/docroot/libraries/adodb5/adodb.inc.php 1899 CacheExecute() insert_GetFaqCategories() |
| count(*) | sql1 | error_msg |
|---|
| Load | Count | SQL | Max | Min |
| Avg Time | Count | SQL | Max | Min |
clerkboy3
This is clearly disgraceful... Shame on the people who did these things!!!
If they really wanted to attack websites of national interest, at least something less serious; but hospitals is really bad!...
These cyber attacks should never occur, especially in national or government websites! Maybe they need more stronger and robust websites! OMG! This is clearly disgraceful... Shame on the people who did these things!!! If they really wanted to attack websites of national interest, at least something less serious; but hospitals is really bad!... These cyber attacks should never occur, especially in national or government websites! Maybe they need more stronger and robust websites!
Are you sure you want to delete this post?