On May 12, 2017 a new strain of the Ransom.CryptXXX (WannaCry) strain of ransomware began spreading widely impacting a large number of organizations, particularly in Europe. This virus specifically targets Microsoft Windows computers.

A hacking tool known as Eternal Blue, developed by US CIA has been enhanced by the hackers to super-charge an existing form of ransomware known as WannaCry, three senior cyber security analysts said.

Wcry is demanding a ransom of $300 to $600 in Bitcoin to be paid by May 15, or, in the event that deadline is missed, a higher fee by May 19. The messages left on the screen say files will remain encrypted. It’s not yet clear if there are flaws in the encryption scheme that might allow the victims to restore the files without paying the ransom.

If you have yet to install the Microsoft fix—MS17-010— you should do so immediately. You should also be extremely suspicious of all e-mails you receive, particularly those that ask the recipient to open attached documents or click on Web links.

If you are an existing client of ours on our Managed Services Platform, you would have already received the fix through your weekly patching cycle, If not please check with your IT and or Security provider to ensure you are covered

Read Reuters Article : http://www.reuters.com/article/us-britain-security-hospitals-idUSKBN18820S

 

Watch Out! Windows 7 Loses Support in January

Watch Out! Windows 7 Loses Support in January

Careful – Your Windows 7 Loses Support in January 2020 If you use Windows 7, you need to be aware that Microsoft will end support for your operating system in January 2020. Now is the time to upgrade to Windows 10.   Windows 7 is an operating system that still...

Juice Jacking: The Next Cyberattack

Juice Jacking: The Next Cyberattack

Juice Jacking is another creative way that cyber attackers are accessing your data. Learn more about the concept and how to prevent it.   The public must be on guard for any cyberattack that comes their way; however, attackers are creative and are constantly...