Hacker News new | past | comments | ask | show | jobs | submit login

Could someone explain how this spreads and then executes itself on other machines? Does it require user interaction?



It uses a vulnerability that allows another computer on the same network to execute arbitrary code on your computer. So you work for a UK hospital, your co-worker downloads an attachment and executes it, and that can be enough to get on your machine if it doesn't have up-to-date security patches.


I don't think it's needed users interface.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: