|Protecting your Computer
With so many emails coming your way, we wanted to send some helpful tips to make sure you know how to protect your computer and systems. Our guest columnist is a trusted expert in proactively securing small business networks:
CEO of 2Secure Corp.
|As you may know, on May 12, hackers launched a global ransomware campaign against tens of thousands of corporate and governmental targets. The attack, known asWannaCry (also known as WannaCry, WCry, WanaCrypt, WanaCrypt0r, or Wanna Decrypt0r)is encrypting files and changing the extensions to: .wnry, .wcry, .wncry and .wncrypt, encrypts files on an infected computer and asks the computer’s user to pay a ransom in order to regain access.
So far we have learned that this ransomware spreads via an email attachment or link. Once a user opens the attachment, WannaCry executes on that computer, encrypts files on local drives, and spreads across the network.
Affected Microsoft Products Include
• Windows Server 2016
• Windows Server 2012 and Windows Server 2012 R2
• Windows Server 2008 R2
• Windows Server 2008
• Windows Server Core installation option
• Windows 10
• Windows RT 8.1
• Windows 8.1
• Windows 7
• Windows Vista
The ransomware spreads itself over the network using a vulnerability in the SMB protocol, which is used by Microsoft for file sharing purposes. This flaw in Windows systems, now codenamed EternalBlue, was first leaked in the latest dump by a hacking group known as the Shadow Brokers. It’s believed that the US National Security Agency (NSA) originally created EternalBlue, the tool that allowed WannaCry to quickly spread across large networks.
Microsoft released a patch MS17-010 to combat EternalBlue in March, yet the majority of targets that were hit on the 12th had neglected to update their systems.
The WannaCry malware attack spreads as a worm, which makes it even more devastating to its targets.
1. Remove old computers and servers operating on old Microsoft Windows operating systems, specifically Windows XP and Windows Server 2003.
What to Do While It’s Happening
1. Power-Off Infected Machines
In case you are not sure what to do or have questions, please call us 646-755-3933 or request a FREE WannaCry Audit.
You will be scheduled on a first come, first served basis, timing is CRITICAL.
|A BIG Thank You to our guest columnist:
Yigal Behar, President & CEO
464 Kings Highway, 2nd Flr Brooklyn, NY 11223
And more on the subject . . .
10 Tips on How to Identify a Phishing or Spoofing Email
Another very important piece of information we all have to be aware of is spoofing. We have received these fake emails at our own BIG headquarters, and have heard from clients who also have been targeted. Please read this great blog that has some important information we can all use!