Skip to main content

WannaCry Ransomware Attack

You may have heard that a globe-spanning ransomware attack known as ransomware program WannaCry is targeting the Microsoft Windows OS. On Friday, 12 May 2017, a large cyber-attack was launched using it, infecting more than 200,000 computers in 150 countries, demanding ransom payments in the cryptocurrency Bitcoin in 28 languages. But it could have been a lot worse—and we have cybersecurity researchers to thank for making sure it wasn’t. 
Thousands of computers in China and Japan hit by WannaCry virus. 
Putin says Russia had 'nothing to do' with global ransomware outbreak.
Microsoft attacks US government over developing 'EternalBlue' exploit that led to hack.
New strains of virus reported but having little effect.
Jeremy Hunt says there has been no second wave of attacks.






Like previous ransomware, the attack spreads by phishing emails, but also uses the EternalBlue exploit and DoublePulsar backdoor developed by the U.S. National Security Agency to spread through a network which has not installed recent security updates to directly infect any exposed systems. A "critical" patch had been issued by Microsoft on 14 March 2017 to remove the underlying vulnerability for supported systems, but many organizations had not yet applied it.

Security experts have disputed claims that the virus was spread through suspicious emails, saying that computers were vulnerable to the bug regardless of how vigilant users were. Experts said that unless IT departments patched the virus and backed up their files they could be hit by the attacks. 


As s/he reported in a fascinating blog post, MalwareTech had found an unregistered URL address in WannaCry’s code. Suspecting that the address had something to do with how the virus communicated—a common feature in botnets and other types of malware—MalwareTech registered the domain and watched as traffic from thousands of infected computers came flooding in, nearly overloading the server hosting the domain. Usually this kind of “sinkhole” move is an effort to disrupt a botnet, for example, from issuing commands to infected systems.


It was then used by the still-anonymous cyber criminals to infect PCs with Friday's ransomware.


"The governments of the world should treat this attack as a wake-up call," In a statement, Microsoft president Brad Smith said. "Repeatedly, exploits in the hands of governments have leaked into the public domain and caused widespread damage. An equivalent scenario with conventional weapons would be the U.S. military having some of its Tomahawk missiles stolen."


Microsoft released a patch over the weekend for the Eternal Blue vulnerability that defends against it even with older versions of Windows.

Comments

Popular posts from this blog

Why You Should Hire A Virtual Assistant

Hiring a  Virtual Assistant  can be a simple solution.  It would allow you time to spend on managing the important tasks in your business and less time managing your mundane tasks. This can increase your productivity. A virtual assistant by definition is usually a self-employed professional who carries out many different administrative jobs depending on each different client or project. They usually work for multiple people, but they just split their time up between each client. This is a better alternative to small business owners who are just starting out than hiring a full time administrative assistant. If you want to hire a couple of people and want to start something, you need a place to put them. A VA organization will do all of your tasks from their own office. You need to just hire them and they will provide you all of your services as much as they can. Suppose you hired a Personal Assistant for your administrative stuff. He has a particular hour to work....

How to create FTP server in Windows and make it public

FTP Server: The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network. Using FTP, a client can upload, download, delete, rename, move and copy files on a server. A user typically needs to log on to the FTP server, although some servers make some or all of their content available without login, also known as anonymous FTP. FTP Client Application: There are a vast number of FTP client applications available on Internet for all OS platform.  Filezilla (Windows), WinSCP (Windows), Transmit  (OS X), FireFTP (All Platform with Firefox), Cyberduck (OS X), LogicalDOC  (All Platform), NASLite (Linux), etc. FTP in Windows: Instead of using above third-party FTP client application you can also create your own FTP Server in your Windows system.  By doing this you can able to share your file and folder with other computers are connecting with your  LAN .  It is a very u...

TIME MANAGEMENT – THE KEY TO VIRTUAL ASSISTANTS’ SUCCESS

“Time is money” , a phrase used by Benjamin Franklin in “ Advice to a Young Tradesman, Written by an Old One” .  The more preferable line can be “Time is more than money”  because you can’t use your money to make more time, but you can use your time to make money and much more. From our childhood, we learned about time management. People often say,  “I don’t have the time to…” : meet people, make the launch, do exercise, start an organization, blah..blah… Of course, they don’t have time, just because of their undisciplined time management. Just think about them – founder of google, owner of Microsoft, inventor of social media. We all have the same 24 hours in each day. How can they maintain their time and manage everything in their busy schedule? And we don’t have time to make our daily necessary things. It’s all about a proper Time Management. Time Management is the most powerful key for  Virtual Assistants  to unlock their destiny.  Virtual Assist...
Download FIFA from here