Ransomware Attacks Rampant Worldwide -
Danger Will Robinson !!!
Make sure to back up
every connected computer, server and storage device
on your network.
Any unprotected computers or servers remain vulnerable.
The phishing emails contain malicious links and attachments. When clicked, the intrusion is completed on the recepient's computer - Ransomware has been downloaded into the victim's computer.
CARBONITE - a back-up service - stated:
"A devastating ransomware attack is racing around the globe, locking down data and infecting systems at hospitals, businesses and residences in more than 150 countries in the last 72 hours.
"The WannaCrypt ransomware virus first made headlines on Friday, May 12, 2017, when it began disrupting operations at hospitals throughout Great Britain. By Monday morning, the ransomware had spread to more than 200,000 computer systems worldwide.
"At one point, the creators of WannaCrypt were sending five million phishing emails per hour, according to Forcepoint Security Labs.
"WannaCrypt is designed to exploit a Windows operating system flaw first discovered by the U.S. National Security Agency. Without the patch, systems are still vulnerable."
GET THE VACCINE AGAINST WannaCrypt!
Patch issued by Microsoft for vulnerabilities before attack.
Taking a highly unusual step, Microsoft even issued a fix for "retired"
versions of Windows that are still in use.
From Microsoft: (QUOTED ENTIRELY)
- "In March, we released a security update which addresses the vulnerability that these attacks are exploiting. Those who have Windows Update enabled are protected against attacks on this vulnerability. For those organizations who have not yet applied the security update, we suggest you immediately deploy Microsoft Security Bulletin MS17-010. Complete chart system by system here.
- "For customers using Windows Defender, we released an update earlier today [May 12, 2017] which detects this threat as Ransom:Win32/WannaCrypt. As an additional “defense-in-depth” measure, keep up-to-dateanti-malware software installed on your machines. Customers running anti-malware software from any number of security companies can confirm with their provider, that they are protected.
- "This attack type may evolve over time, so any additional defense-in-depth strategies will provide additional protections. (For example, to further protect against SMBv1 attacks , customers should consider blocking legacy protocols on their networks)."
VERY informative Video worth the effort despite ad and slow loading.
Fellow ActiveRain member, Jerry Lucas,
suggests we check out his post about Ransomware as well.
NOT A LAUGHING MATTER!!!
Ransoms must be paid in Bitcoin.
Do you even have any Bitcoin?
Be sure you are safe and then BUY A NEW HOME with us!
Thief image from anonymous Italian artist.