Home WannaCry Ransomware More About WannaCry Ransomware

WannaCry Ransomware


The WannaCry ransomware worm, aka WanaCrypt, WannaCrypt or Wcry, exploded on at least 75,000 computers across 99 countries, infecting hospitals, businesses including Fedex, rail stations, universities, one national telecom operator (at least), and many more organizations on the 12th May 2017. European countries, including Russia, were among the worst hit. In response, Microsoft has released emergency security patches to defend against the malware for unsupported versions of Windows, such as XP and Server 2003, as well as modern builds.


hci

The Ransomware has been Identified as WannaCry To recap, WannaCrypt is installed on vulnerable Windows computers by a worm that spreads across networks by exploiting a vulnerability in Microsoft's SMB file-sharing services. It specifically exploits a bug designated as MS17-010 that Microsoft patched in March for modern versions of Windows, and today for legacy versions. All remaining unpatched systems are therefore vulnerable and can be attacked. This bug was, once upon a time, exploited by the NSA to hijack and spy on its targets. Its internal tool, codenamed Eternal Blue, was stolen from the agency (and leaked online in April), putting this US government cyber-weapon into the hands of any willing miscreant. Almost immediately, it was used to hijack thousands of machines on the internet. Now, someone has taken that tool and strapped it to ransomware: the result is a variant of WannaCrypt, which spreads via SMB (Microsoft Server Message Block Protocol) and, after landing on a computer, encrypts as many files as it can find. It charges $300 or $600 in Bitcoin to restore the documents. It is adept at bringing offices and homes to a halt by locking away their data.


ransom

Exposure of Traditional Perimeter Firewall Limits Data center is becoming larger and more complex than ever, especially in this cloud era, traditional firewall sitting on the network perimeter simply couldn’t meet the security demand of modern data center: 1. The perimeter firewall is used to secure the perimeter, prevent intrusions and keep from virus attack. The mechanism of this type of firewalls is to protect traffic from client to server (north-south), and not from server to server (east-west). 2. It’s simply unrealistic to install loads of firewalls inside data center to protect thousands of workloads with a variety of security demands. 3. Highly dynamic workloads require high management overhead on the perimeter firewall and the policy of perimeter firewall is not self-adaptable, granular and automated enough to follow the migration of workloads. 4. It takes a large amount of time and resource to come up with the right patch solution for the malware on the perimeter firewall, the cost during this period is unimaginable.


map

Step 2: If you’re not sure whether there’s normal access via ports 135, 137, 139, 445 and 3389 among VMs, you can open Packet Drop List, check the intercepted access, and then allow it individually.

sa

Step3: Go download your update patch whenever its convenient for you.
The kernel of Sangfor HCI is deeply integrated with IPS and WAF security modules with extremely limited ports and super high security, not to mention the built-in snapshot and backup features. Once you detect any infected VMs, simply roll back to malware-free backup version with one click at your fingertip.


se
su

Defends from Ransomware

Download Ransomware Solution

Download