Published: Fri, May 19, 2017
Hi-Tech | By Ellis Neal

CERT_In Instructions On Wanna CRY Attack Ransomware

CERT_In Instructions On Wanna CRY Attack Ransomware

"This attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem", Microsoft President and Chief Legal Officer Brad Smith said in a blog post on Sunday, comparing the recent leaks of NSA and Central Intelligence Agency hacking tools to, in the real world, the theft of cruise missiles. To tackle the situation, and to download the solution at the earliest Microsoft has introduced a security patch, and consumers across the globe have advised.

Computers running older versions, such as Windows XP used in Britain's NHS health system, while individually vulnerable to attack, appear incapable of spreading infections and played a far smaller role in the global attack than initially reported.

WannaCry's worm-like capacity to infect other computers on the same network with no human intervention appear tailored to Windows 7, said Paul Pratley, head of investigations & incident response at United Kingdom consulting firm MWR InfoSecurity. Until Friday, Microsoft had not released a security update for Windows XP in over three years.

Fortunately, the does not exist within Windows 10; however it is present in all version of former Windows OS, dating back to the Windows XP. India's digital security office cautioned Internet clients against the worm that secures documents of a tainted PC and requests that the client pays a payment of $300 in Bitcoin virtual cash to open the operating system.

Cybersecurity stocks were also climbing in the wake of the incident, with shares for London-based security and hardware software firm Sophos going up 7% yesterday.

The "WannaCry" virus has infected 2,000 computers so far in the country, according to the latest figures released by officials in Tehran.

The six steps companies can take immediately range from common sense solutions to complex crisis planning, but the list begins with disconnecting infected machines from the network removing all backups offline to prevent them from being encrypted.

Researchers from a variety of security firms say they have so far failed to find a way to decrypt files locked up by WannaCry and say chances are low anyone will succeed. It is through the security loophole of the Windows Server Message Block (SMB) file-sharing service that the ransomware spread unchecked through local networks in businesses worldwide. And it underscores the way much of the underground trade for computer bugs resembles a real-world commercial market.

Information technology experts warned about a potential second wave of Wanna Decryptor (WannaCry) ransomware attacks, which hit 200,000 computer users in over 150 countries.

"The same things are causing the same problems".

Like this: