• Solutions
    • Networking & Infrastructure
    • Collaboration & Customer Experience
    • Data Center & Multi Cloud
    • Cybersecurity & Public Safety
  • Services
    • Consulting Services
    • Professional Services
    • Warpcom Command Center
      • Network Operations Center (NOC)
      • Security Operations Center (SOC)
      • Support Services
  • Warpdev
  • Partners
  • Resources & News
    • News
    • Blog
    • E-Books
  • Who We Are
    • About Us
    • Mission, Vision, and Values
    • Why Warpcom
    • Management Team
    • (APCER) Certifications
    • Career Opportunities
    • Contacts
  • Client Portal
  • Contacts
  • pt-ptPT
  • esES
  • enEN
Warpcom | together with you.
Warpcom | together with you.
  • Language
    • pt-ptPT
    • esES
    • enEN
  • Client Portal
  • Contacts
  • Solutions
    • Networking & Infrastructure
    • Collaboration & Customer Experience
    • Data Center & Multi Cloud
    • Cybersecurity & Public Safety
  • Services
    • Consulting Services
    • Professional Services
    • Warpcom Command Center
      • Network Operations Center (NOC)
      • Security Operations Center (SOC)
      • Support Services
  • Warpdev
  • Partners
  • Resources & News
    • News
    • Blog
    • E-Books
  • Who We Are
    • About Us
    • Mission, Vision, and Values
    • Why Warpcom
    • Management Team
    • (APCER) Certifications
    • Career Opportunities
    • Contacts

Ransomware

Warpcom | together with you. > Resources & News > News > Warp Info > Ransomware
Ransomware
Ransomware
22 May, 2017 Gonçalo Alberto

Ransomware

Over the last few days, Warpcom has been receiving several requests for information and recommendations on the recent Ransomware attack, to which we are responding on an individual basis, even though we consider that this kind of information should be shared with all of our clients.

The well-known ransomware attacks or data encryption attacks, and subsequent blackmail for data recovery, and information theft, have reached a significant relevance due to a recent massive attack, which occurred on the last 12 May.

These usually smaller-scale and less widespread attacks have been occurring frequently, each day around the globe, affecting also several entities in Portugal.

Particularly vulnerable entities share several common features, namely:

  • They still use operating systems that are not supported by manufacturers, such as, Windows XP, Windows 8, Windows 2003;
  • They use supported operating systems, but which are not updated with the most recent patches;
  • They do not have a perimeter security system/data centre at various levels;
  • They do not have an active backup policy, both on and off the network:
  • They do not have an active vulnerability detection policy within the communication and system infrastructure;
  • They do not have an endpoint protection solution (anti-virus/antimalware program).

As a preventive measure and good practice activity, in addition to the adoption of the identified measures and the ransomware prevention software, we recommend the cautious and responsible use to all users as follows:

  • Block protected or encrypted attachments;
  • Avoid opening emails from unknown people;
  • Be careful when clicking on potentially harmful links within the emails;
  • Do not trust unsafe or untrusted websites.
  • Do not trust emails where people use names similar to common services, such as PayPal, CTT, financial institutions or other distribution companies, emails with excessive characters or emails you don’t expect;
  • Do not click a link you don’t trust, whether in a website, Facebook or in messaging applications;
  • In case you receive a message from a known source with links, always make sure you confirm who the sender is before opening the mentioned link;
  • Use a well-known anti-virus program and make sure to run the latest update.

Links that provide relevant information in relation to the recent occurrence:

Technical information on WannaCry

http://blog.talosintelligence.com/2017/05/wannacry.html

IPS signatures

Microsoft Windows EternalBlueSMB Remote Code Execution

https://technet.microsoft.com/en-us/library/security/ms17-010.aspx

Microsoft Windows SMB Remote Code Execution (MS17-010: CVE-2017-0143)

http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0143

Microsoft Windows SMB Remote Code Execution (MS17-010: CVE-2017-0144)

Microsoft Windows SMB Remote Code Execution (MS17-010: CVE-2017-0145)

http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0145

Microsoft Windows SMB Remote Code Execution (MS17-010: CVE-2017-0146)

http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0146

Microsoft Windows SMB Remote Code Execution (MS17-010: CVE-2017-0147)

http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0147

Microsoft Windows SMB Remote Code Execution (MS17-010: CVE-2017-0148)

http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0148

 

Affected Operating Systems Update

Source:

https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/

Download de security updates (English Language): Windows Server 2003 SP2 x64, Windows Server 2003 SP2 x86,Windows XP SP2 x64, Windows XP SP3 x86, Windows XP Embedded SP3 x86, Windows 8 x86,Windows 8 x64

Download localized versions for the security update for Windows XP, Windows 8 or Windows Server: http://www.catalog.update.microsoft.com/Search.aspx?q=KB4012598

 

Warpcom, with its vast experience and know-how in the design and implementation of information and communication technology solutions and offering a full range of solutions and services within the cyber security domain, supported by worldwide reference technological partnerships, is available to analyse the specificities of each one of its clients in order to be able to create a solution adapted to each challenge.

Do not hesitate in contacting us should there be any queries.

Manuel Mira

Operations Director

22 May, 2017
Share on Facebook
Facebook
Share on LinkedIn
Linkedin

Subscrição de Conteúdos

Related Articles

Warp Info
ROBOT Attack
15 December, 2017
Warp Info
Ransomware
28 June, 2017

Where are we ?

Lisboa

Estrada de Alfragide, 67
Alfrapark - Edifício F - Piso 3
2610-008 Amadora

t +351 214 169 500

f +351 214 169 518

Porto

Rua Brigadeiro Nunes da Ponte, 114 R/C A4
4150-036 Porto

t +351 225 192 700

f +351 225 192 708

Faro

Rua Prof. Alberto Uva, 25,
8000-176 Faro
 

t +351 289 359 100

f +351 289 359 109

Funchal

Rua Princesa D. Amélia, 22, Lj 9
9000-019 Funchal
 

t +351 291 238 004

Madrid

C/Manuel Tovar, 42 – 2º,
Edificio Meeting Point,
28034 Madrid  

t +34 91 125 42 10

Follow Us

  • Privacy policy and cookies
  • Site map
  • Who We Are
ISO 45001
Este website utiliza cookies para melhorar a sua experiência de utilização. Ao continuar a navegação no website estará a consentir o seu uso.OKSaiba mais