[menog] WannaCry Ransomware

Harith Dawood alwathiq2007 at gmail.com
Sat May 20 14:32:52 UTC 2017


Dear Mr. Hisham Ibrahim

Thank you very much for your important information.

Best regards;
Harith

On Mon, May 15, 2017 at 12:42 AM, Hisham Ibrahim <hmi at ripe.net> wrote:

> Dear All,
> As you are no doubt aware, we are currently experiencing an unprecedented
> ransomware attack at a global scale. The malware was detected on 12 May
> 2017 and has the capability to spread across networks taking advantage of a
> critical exploit in a popular communication protocol used by Windows
> systems.
> Many of you have already reached out and are actively involved in
> containing this threat. It is believed that the infection and propagation
> rate may go up on Monday when people return to their workplaces.
> Below is the Europol warning / update about the current ransomware threat.
> If you think this would be useful to anyone in our community, please
> forward it on.
> A list of tips and advice on how to prevent ransomware from infecting your
> electronic devices can be found at:
> https://www.europol.europa.eu/sites/default/files/images/
> editor/ransomware-01.jpg
> Regards,
> Hisham
>
> Begin forwarded message:
>
> *If you are a victim or have reason to believe that you could be a victim*
>
> This is link provides some practical advice on how to contain the
> propagation of this type of ransomware:
> *https://www.ncsc.gov.uk/guidance/ransomware-latest-ncsc-guidance*
> <https://www.ncsc.gov.uk/guidance/ransomware-latest-ncsc-guidance>
>
> The most important step involves patching the Microsoft vulnerability
> (MS17-010):
> *https://technet.microsoft.com/en-us/library/security/ms17-010.aspx*
> <https://technet.microsoft.com/en-us/library/security/ms17-010.aspx>
>
> A patch for legacy platforms is available here:
>
> *https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks*
> <https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks>
>
> In instances where it is not possible to install the patch, manage the
> vulnerability becomes key. One way of doing this would be to disable the
> SMBv1 (Server Message Block) protocol:
> *https://support.microsoft.com/en-us/help/2696547*
> <https://support.microsoft.com/en-us/help/2696547>
> and/or block SMBv1 ports on network devices [UDP 137, 138 and TCP 139,
> 445].
>
> Another step would be to update endpoint security and AV solutions with
> the relevant hashes of the ransomware (e.g. via VirusTotal).
>
> If these steps are not possible, not starting up and/or shutting down
> vulnerable systems can also prevent the propagation of this threat.
>
> *How to prevent a ransomware attack?*
>
>
>    1. *Back-up! Back-up! Back-up!* Have a backup and recovery system in
>    place so a ransomware infection can’t destroy your personal data forever.
>    It’s best to create at least two back-up copies on a regular basis: one to
>    be stored in the cloud (remember to use a service that makes an automatic
>    backup of your files) and one stored locally (portable hard drive, thumb
>    drive, etc.). Disconnect these when you are done and store them separately
>    from your computer. Your back-up copies will also come in handy should you
>    accidentally delete a critical file or experience a hard drive failure.
>    2. *Use robust antivirus software* to protect your system from
>    ransomware. Always use the latest virus definition/database and do not
>    switch off the ‘heuristic’ functions as these help the solution to catch
>    samples of ransomware (and other type of malware) that have not yet been
>    formally detected.
>    3. *Keep all the software on your computer up to date.* When your
>    operating system (OS) or applications release a new version, install it. If
>    the software you use offers the option of automatic updating, enable it.
>    4. *Trust no one. Literally.* Any account can be compromised and
>    malicious links can be sent from the accounts of friends on social media,
>    colleagues or an *online gaming*
>    <https://blog.kaspersky.com/teslacrypt-20-ransomware/9314/> partner.
>    Never open attachments in emails from someone you don’t know. Similarly,
>    don’t open attachments in emails from somebody you know but from whom you
>    would not expect to receive such as message. Cybercriminals often
>    distribute fake email messages that look very much like email notifications
>    from an online store, a bank, the police, a court or a tax collection
>    agency, luring recipients into clicking on a malicious link and releasing
>    the malware into their system. If in doubt, call the sender at a trusted
>    phone number to confirm the legitimacy of the message received.
>    5. *Enable the ‘Show file extensions’ option in the Windows settings
>    on your computer.* This will make it much easier to spot potentially
>    malicious files. Stay away from file extensions like ‘.exe’, ‘.com’, ‘.vbs’
>    or ‘.scr’. Cybercriminals can use several extensions to disguise a
>    malicious file as a video, photo, or document (like hot-chics.avi.exe or
>    report.doc.scr).
>    6. If you discover a rogue or unknown process on your machine, *disconnect
>    it immediately from the internet or other network connections (such as home
>    Wi-Fi)* — this will prevent the infection from spreading.
>
>
>
>
> _______________________________________________
> Menog mailing list
> Menog at lists.menog.org
> http://lists.menog.org/mailman/listinfo/menog
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.menog.org/pipermail/menog/attachments/20170520/7fd1fc56/attachment.html 


More information about the Menog mailing list