RANSOMWARE isn’t over yet!! Are you protected!!Murtaza J.
Is your computer’s running on Microsoft Windows?? YES! Then you need to take these steps—right away.
Hackers exploited a weakness in older Microsoft Windows servers to perform a large-scale global cyber-attack using ransomware — a wicked software that holds your computer hostage for ransom — and a hacking tool stolen from the U.S. National Security Agency (NSA). The gigantic attack left victims locked out of their PCs with an assurance of returned access if $300 was paid in digital currency Bitcoin—and a warning of destroyed files if the ransom is not met.
At least 200,000 computers have been infected in more than 150 countries, leaving everything from governments and businesses to academic institutions, hospitals and ordinary people affected.
How does it work!
The malware, which “spreads like a worm,” is transferred through a phishing email enclosing a compressed, encrypted file. Just because the file is encrypted, Anti viruses do not identify the infection, called Wanna Decryptor, once downloaded. Wanna Decryptor, a next-gen version of the WannaCry ransomware, takes over the computer as soon as the file is downloaded and then encrypts all the files and asks for a ransom.
Generally, ransomware does not work instantly. But thanks to a stolen NSA cyber-weapon called EternalBlue, which was made public last month by a hacking group known as the “Shadow Brokers,” the malware spread rapidly by exploiting a security flaw in Microsoft Windows servers.
What can you do to protect yourself?
- Make sure your Microsoft Windows server is up to date. Microsoft issued a patch in mid-March to fix the hole in Windows 7 and other supported versions of Windows: Vista, Server 2008, Server 2008 R2, 8.1, Server 2012, RT 8.1, 10, Server 2012 R2, and Server 2016. But those who did not apply the software update were and still are left exposed to the hack.
- Because of the attack, Microsoft rolled out patches to protect older versions of Windows that “no longer receive mainstream support” from the company like Windows XP, Windows 8, and Windows Server 2003. Those running on Windows 10 are fine, as their software is not vulnerable to this particular cyber-attack. Devices that are potentially susceptible are Windows 7 and Windows Server 2008, and earlier operating systems.
- Upgrade to windows 10 and install the security update MS17-010. With the 243.297.0 update, Windows Defender Antivirus detects the malware as Ransom: Win32/WannaCrypt. The company also recommends Device Guard for businesses and Office 365 Advanced Threat Protection for blocking emails carrying malware.
Are you protected? Contact us for free diagnosis today and Virus removal!