The Ransomware Attack, What You Need To Do Next.
23rd May 2017
What is the WannaCry Ransomware Attack?
On Friday 12th May 2017, businesses around the world were hit by the biggest Ransomware attack in history, encrypting data as it spread, demanding a payment of £230 ($300) in bitcoins for the return of their data, showing that businesses are more vulnerable than ever.
So far there have been a reported 296 payments totalling £76,555 ($99,448) made to the ransomware bitcoin wallets, with no companies reporting that their files were released once payment had been made. Remember these are cyber criminals and nothing is guaranteed.
Security analysts are expecting more advanced ransomware attacks within days. Immediate action is recommended.
Organisations across the world have been targeted with the NHS, FedEx, Renault and Telefonica reporting large scale attacks – those are the ones large enough to make the news. Hundreds of smaller companies have reported issues.
It’s estimated that over 1.3 million vulnerable computers are still in use.
Windows 7 vulnerability exploited by WannaCry Worm.
According to Kaspersky lab, Windows 7, which was first released in 2009 was the most widely infected operating system, with the x64 edition being hit the hardest. The x64 edition is widely used in large organisations which allowed the WannaCry Worm to attack hundreds of computers simultaneously.
Many organisations seem to have been caught out because they failed to apply a patch, issued by Microsoft in March that blocked the vulnerability which WannaCry exploited.
Still running Windows 7? Here’s what you need to do.
Microsoft have released a security patch update to safeguard your system from attacks.
Click here to be taken to the download of the security patch and install now!
Additional security measures to be taken immediately. (recommended)
- Take an offsite backup of your data (ie, back up to a USB drive) – start with the most critical and valuable data first. If you’re using a USB drive, once your backup has finished, unplug the drive otherwise in the event of an outbreak this could become encrypted as well.
- Apply all available Windows security updates, to every computer and server in your business – if you’re running an unsupported version of Windows (ie Windows XP, or Server 2003), apply Microsoft’s emergency security patch for WannaCry: KB982316.. Then make plans to upgrade to a newer version of Windows (incidentally, Windows 10 is immune to the current threat).
You should review all of your security measures taken immediately. For more information on what you need to review read our ”The DOOMSDAY clock is ticking: Ransomware Attack” blog.
Ransomware attack threats typically enter your business via malicious email, then download their payload via the internet. However, security experts have found that the WannaCry worm spread largely by seeking out vulnerable machines on the net by itself. Meaning your businesses IT security is more vital than ever before.
When opening emails – if it looks suspicious, or if you’re unsure, delete it, or send it to your friendly IT Support company for review (we can then take the appropriate action).
Make sure your staff are clued up when it comes to suspicious emails and the security of their computer. Take time each month to ensure the security patches and systems are up to date on yours and your employee’s machines.
No ICT system is ever 100% secure, so always be cautious. Regularly review and improve on your businesses security and backup solutions, it’s better to be safe than sorry.
Contact us now.
If you are concerned about the WannaCry Ransomware attack or any other ICT issues, contact our helpdesk – open Monday to Friday 9am – 5pm for ad-hoc support.
PC Comms offer a free review of your IT systems, call us today to book yours on 01278 458558 or email firstname.lastname@example.org