According to numerous reports, a widespread ransomware campaign exploiting a vulnerability in Microsoft Windows is affecting various organizations. Even though Microsoft released a patch for the vulnerability in March, reports of tens of thousands of infections of unpatched computers have occurred in as many as 99 countries, including the United States, United Kingdom, Spain, Russia, Taiwan, France, and Japan.
The software can run in as many as 27 different languages. The latest version of this ransomware variant—known as WannaCry, WCry, or Wanna Decryptor—was discovered the morning of May 12, 2017, around 4:00 a.m. EDT by an independent security researcher and has spread rapidly over several hours. Public reports indicate a requested ransom of .1781 bitcoins—roughly $300.
How do I prevent infection?
IT Services recommends you perform the following tasks to help ensure your Microsoft Windows computer is not vulnerable.
- Apply the Microsoft patch for the MS17-010 SMB vulnerability dated March 14, 2017.
- Scan all incoming and outgoing emails to detect threats and filter executable files from reaching the end users.
- Ensure anti-virus and anti-malware solutions are installed and set to automatically conduct regular scans.
If you have any questions or need help performing the recommended steps to protect your computer, please contact IT Services for assistance.