Criminals used the NSA’s leaked EternalBlue vulnerability to attack Windows machines with WannaCry ransomware. It has not responded to repeated requests for comment about the ransomware attack.
In addition to ensuring applications and operating systems are patched with the latest security updates, CERT says organizations should “be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about employees or other internal information”. I can see this happening with individuals, but can anyone in their right mind use an unsupported version of an operating systems on a banking or hospital system?
Computers and networks that hadn’t recently updated their systems are still at risk because the ransomware is lurking. Microsoft requires Windows 10 customers to automatically update their computers, but some people with older PCs disabled automatic updates.
In the past few days, thousands of computers across the world have been locked up and users” files have been held at ransom due to a malware called “Ransomware’ that takes over a computer’s operating system. Kaspersky Lab says that the majority of affected systems were in Russian Federation. According to Business Insider, about 7% of PCs are still running XP, and nearly half are running Windows 7 (which is also soon reaching that window where its support will end).
“We can certainly expect follow-on attacks”. Install all Windows updates. 5. They should also use the indicators of compromise which are associated with this activity. “We have seen vulnerabilities stored by the Central Intelligence Agency show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world”, blasted Microsoft’s chief legal officer and president Brad Smith in a blog. There is no reason why our government’s best security experts should not be able to design a network that would prevent this type of theft. As expert Troy Hunt notes in a blog post about the attack, interest in ransomware has been on the rise, but especially since early 2016.
Looking at the attackers’ Bitcoin wallets they’ve made $42,000 so far. That’s why it is critical that you keep your Windows OS up to date.
“Disable SMBv1 (a server component) with the steps documented at “Microsoft Knowledge Base Article 2696547″ and as recommended previously”.
The announcement could come as soon as this week.
“This is big and set to get bigger”. However, a glitch in the installer means that the variant propagates, but doesn’t install the part of the malware that locks the computer.
Always make sure your files are backed up.
Evidently we need stronger incentives not just for companies to release more secure products, but also for users to keep them updated and to protect their data with encryption and backups.
China’s cyber authorities have repeatedly pushed for what they call a more “equitable” balance in global cyber governance, criticising US dominance.
What is “WannaCry” and how does the ransomware work? As per a NDTV report, WannaCry was stopped in its tracks by a British researcher, but it did infect almost 2 lakh computers worldwide.