canopic jug writes:
A derivative of Microsoft Windows ransonware, Wannacry, has hit a Boeing production plant in Charleston, South Carolina. An internal memo from Mike VanderWel, chief engineer of Boeing Commercial Airplane production engineering, warned that the company's production systems and airline software were "at risk".
Wannacry was based on Microsoft Windows' CVE 2017-0144 which is used in the EternalBlue exploit kit. EternalBlue was initially utilized in apparent coordination with Microsoft's long delay in patching. Despite massive media spin, Wannacry was found to have hit all recent versions of Microsoft Windows.
The Verge: Boeing production plant hit with WannaCry ransomware attack
The New York Times: Boeing Possibly Hit by ‘WannaCry’ Malware Attack
The Daily Express: Vital Boeing computer network INFECTED with WannaCry VIRUS - is it safe to fly?.
Previously: UK Blames North Korea for WannaCry Attacks, Says NHS Didn't Follow Cybersecurity GuidelinesWannaCry Ransomware Attack Linked to North Korea by Symantec
A new variant of ransomware was renamed "WannaFly?" In related news, Betteridge's law of headlines replied with a definite "No!".
Multibillion dollar company doesn't airgap production systems.
Likely because the software updates can't be distributed by CD or Portable hard drive (becuase the coders are too young to know how to do that, or like because "internet!")
Do they even have prod/dev/test/train anymore, or is everything "prod-and-hope-last-backup-worked"?
There was a day when code was code... now its a bunch of calls to blobs.
And I do not trust the blobs.