[menog] WannaCry Ransomware

Barry Raveendran Greene bgreene at senki.org
Sun Jun 4 20:48:27 UTC 2017

Hi Team,

One of the key tools that worked during WannaCry was Exploitable Port Filtering in the Operator’s networks. Two articles are just posted to help those Operators/ISPs/Carriers who have not yet deployed this type of filtering:

What are you doing to prepare for the next “scanning malware?”

Filtering Exploitable Ports and Minimizing Risk to and from Your Customers

The later article will be updated over the next month. I’m working with a variety of operators to get their deployment experience documented. Please e-mail me if you have questions, comments, or suggestions. I would also welcome insight from anyone on MENOG who have deployed Exploitable Port Filtering in their networks.

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 496 bytes
Desc: Message signed with OpenPGP
Url : http://lists.menog.org/pipermail/menog/attachments/20170604/6b000a92/attachment.bin 

More information about the Menog mailing list