[menog] WannaCry Ransomware
Barry Raveendran Greene
bgreene at senki.org
Sun Jun 4 20:48:27 UTC 2017
One of the key tools that worked during WannaCry was Exploitable Port Filtering in the Operator’s networks. Two articles are just posted to help those Operators/ISPs/Carriers who have not yet deployed this type of filtering:
What are you doing to prepare for the next “scanning malware?”
Filtering Exploitable Ports and Minimizing Risk to and from Your Customers
The later article will be updated over the next month. I’m working with a variety of operators to get their deployment experience documented. Please e-mail me if you have questions, comments, or suggestions. I would also welcome insight from anyone on MENOG who have deployed Exploitable Port Filtering in their networks.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 496 bytes
Desc: Message signed with OpenPGP
Url : http://lists.menog.org/pipermail/menog/attachments/20170604/6b000a92/attachment.bin
More information about the Menog