[npnog] SECOND GLOBAL RANSOMWARE OUTBREAK UNDER WAY
Rupesh Basnet
rupesh at omnetworks.com.np
Wed Jun 28 00:09:50 NPT 2017
A SCARY NEW RANSOMWARE OUTBREAK USES WANNACRY’S OLD TRICKS
A global WannaCry-like ransomware outbreak–which began in Russia and
Ukraine and spread across Europe–is being reported today. The attack is
locking down networks in a number of industries, including energy,
transportation, shipping and financial.
Reports suggest that ransomware is similar in scope and intensity to
WannaCry and could be spreading using the same leaked NSA EternalBlue
exploit that WannaCry used in early May to infect machines in more than
150 countries.
Here’s what is know right now:
* Various media reports say the ransomware bares similarities to the
Petya ransomware family
<https://nakedsecurity.sophos.com/2016/04/04/new-ransomware-with-an-old-trick-petya-parties-like-its-1989/> that
encrypts MFT (Master File Tree) tables and overwrites the MBR
(Master Boot Record), dropping a ransom note and leaving victims
unable to boot their computer. Because it blocks boot efforts and
prevents affected systems from working altogether, it’s considered
more dangerous than typical ransomware strains.
* Various media reports suggest the attacker took inspiration from
last month’s WannaCry outbreak
<https://www.sophos.com/en-us/lp/wanna-ransomware-outbreak-how-to-stay-protected.aspx?cmp=70130000001xKqzAAE>,
which infected hundreds of thousands of computers across the globe
by exploiting NSA code leaked by Shadow Brokers
<https://nakedsecurity.sophos.com/2017/05/17/wannacry-the-ransomware-worm-that-didnt-arrive-on-a-phishing-hook/>.
Specifically, it used a variant of the Shadow Brokers’ APT
EternalBlue Exploit (CC-1353), which targeted a flaw in the Windows
Server Message Block (SMB) service.
* Attackers are demanding payment of a $300 ransom in Bitcoins to
regain control, according to various reports.
Defensive measures
Here’s what we urge you to do right now:
* Patch your systems, even if you’re using an unsupported version of
XP, Windows 8 or Windows Server 2003
<http://www.catalog.update.microsoft.com/Search.aspx?q=KB4012598>
* Back up regularly and keep a recent backup copy off-site. There are
dozens of ways other than ransomware that files can suddenly vanish,
such as fire, flood, theft, a dropped laptop or even an accidental
delete. Encrypt your backup and you won’t have to worry about the
backup device falling into the wrong hands
* Avoid opening attachments in emails from recipients you don’t know.
--
Regards,
Rupesh Basnet
M: +9779801043594
Skype: roopeess
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.npnog.org/pipermail/npnog/attachments/20170628/26297a66/attachment.html>
More information about the npnog
mailing list