[npnog] We surely don't "WannaCry"

Indiver Badal indiver at gmail.com
Mon May 15 10:13:10 NPT 2017


We surely don't.

I found very good info here:
https://www.haveibeencompromised.com/wannacry

I was happy to learn activation of kill-switch. However, variants were quick to surface, so still this is an ongoing threat. Please treat this threat seriously.

Thanks
Indiver



> On May 15, 2017, at 10:01 AM, Kijush Maharjan via npnog <npnog at npnog.org> wrote:
> 
> Hi Netizens,
> 
> We might want to rally Windows users (anything older than Windows 10) to update their systems and their AV tools to make sure this ransomware does not affect Nepalese users (esp govt agencies who are dependent on older windows OS).
> 
> Please go through the link for more information.
> 
> https://securelist.com/blog/incidents/78351/wannacry-ransomware-used-in-widespread-attacks-all-over-the-world/ <https://securelist.com/blog/incidents/78351/wannacry-ransomware-used-in-widespread-attacks-all-over-the-world/>
> 
> 
> Regards,
> Kijush
> _______________________________________________
> npnog mailing list
> npnog at npnog.org
> https://lists.npnog.org/listinfo/npnog

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.npnog.org/pipermail/npnog/attachments/20170515/7a735f65/attachment.html>


More information about the npnog mailing list