NonPetya: no evidence it was a “smokescreen”
Many well-regarded experts claim that the not-Petya ransomware wasn't "ransomware" at all, but a "wiper" whose goal was to destroy files, without any intent at letting victims recover their files. I want to point out that there is no real evidence of this.Certainly, things look suspicious. For one thing, it certainly targeted the Ukraine. For another thing, it made several mistakes that prevent them from ever decrypting drives. Their email account was shutdown, and it corrupts the boot sector.
But these things aren't evidence, they are problems. They are things needing explanation, not things that support our preferred conspiracy theory.
The simplest, Occam's Razor explanation explanation is that they were simple mistakes. Such mistakes are common among ransomware. We think of virus writers as professional software developers who thoroughly test their code. Decades of evidence show the opposite, that such software is of poor quality with shockingly bad bugs.
It's true that effectively, nPetya is a wiper. Matthieu Suiche does a great job describing one flaw that prevents it working. @hasherezade does a great job explaining another flaw. But best explanation isn't that this is intentional. Even if these bugs didn't exist, it'd still be a wiper if the Continue reading
New investors included Canvas Ventures and Hewlett Packard Enterprise.
Startup manages connected devices for Comcast, SoftBank, Orange, and others.
Prior to this deal, Cloudyn was available on the Azure marketplace.
AT&T said XGS-PON is less expensive than Verizon's optical plans.
Let's look at the ecosystem that supports white box designs.
The initial code was created by Intel.
It now provides infrastructure, cloud services, and multicloud management.