WannaCry Ransomware: Microsoft Calls Out NSA For 'Stockpiling' Vulnerabilities
- Author: Latoya Cobb May 23, 2017,
May 23, 2017, 11:11
Mumbai:Further, the RBI has asked banks to follow the instructions of government firm Indian Computer Emergency Response Team (CERT-In) to prevent the attack by ransomware, "WannaCry", which has impacted various IT networks in over 150 countries.
Should you ever pay the ransom?
Europol's European Cybercrime Centre said that anyone hit by ransomware should use the unlocking tools provided at NoMoreRansom.org, a free resource developed by Europol in partnership with the Dutch police and other industry partners.
One theory suggested that 90 percent of NHS trusts across the United Kingdom were using Microsoft's 16-year-old OS Windows XP, which could leave them susceptible to attacks.
Microsoft's president and top lawyer said Sunday that the ongoing cyberattacks, which experts are calling the largest in history, should be a "wake-up call" for governments - especially the U.S.
Government agencies were encouraged to take preventative measures against ransomware and other security threats, such as keeping software up to date, avoiding suspect links or attachments in emails, and keeping regular backups.
WannaCry uses EternalBlue, which takes advantage of a vulnerability in the SMB protocol, to worm its way through local networks and online. There are many possibilities and all provide at least some protection, even if it's only reminders to be cautious when downloading potentially infected files. But the ransomware making headlines, called WannaCry, is a bit unusual. The attack mostly impacted computers in Europe and Asia and for the most part spared North America.
What versions of Windows are affected?That prompted the company to issue another patch on Friday for older and unsupported operating systems such as Windows XP, allowing users to secure their systems without requiring an upgrade to the latest operating software. Here's what you should do to protect yourself. Many security firms are already aware of WannaCry in past forms and most are looking at this one right now to see how it might be stopped. "We are implementing remediation steps as quickly as possible". But there are a few things that businesses can do to limit the damage it causes.
Authorities have been encouraging affected companies to contact law enforcement and not pay the ransom.
They know it is not a good look to be caught out by ransomware hackers.
The ransomware called WannaCrypt or WannaCry encrypts the computer's hard disk drive and then spreads laterally between computers on the same LAN.