[npnog] We surely don't "WannaCry"

Kijush Maharjan kijush.maharjan at gmail.com
Mon May 15 17:15:04 NPT 2017


Infection Map.

https://intel.malwaretech.com/botnet/wcrypt/?t=24h&bid=all <https://intel.malwaretech.com/botnet/wcrypt/?t=24h&bid=all>


 Regards,
Kijush



> On May 15, 2017, at 10:13, Indiver Badal via npnog <npnog at npnog.org> wrote:
> 
> We surely don't.
> 
> I found very good info here:
> https://www.haveibeencompromised.com/wannacry <https://www.haveibeencompromised.com/wannacry>
> 
> I was happy to learn activation of kill-switch. However, variants were quick to surface, so still this is an ongoing threat. Please treat this threat seriously.
> 
> Thanks
> Indiver
> 
> 
> 
>> On May 15, 2017, at 10:01 AM, Kijush Maharjan via npnog <npnog at npnog.org <mailto:npnog at npnog.org>> wrote:
>> 
>> Hi Netizens,
>> 
>> We might want to rally Windows users (anything older than Windows 10) to update their systems and their AV tools to make sure this ransomware does not affect Nepalese users (esp govt agencies who are dependent on older windows OS).
>> 
>> Please go through the link for more information.
>> 
>> https://securelist.com/blog/incidents/78351/wannacry-ransomware-used-in-widespread-attacks-all-over-the-world/ <https://securelist.com/blog/incidents/78351/wannacry-ransomware-used-in-widespread-attacks-all-over-the-world/>
>> 
>> 
>> Regards,
>> Kijush
>> _______________________________________________
>> npnog mailing list
>> npnog at npnog.org <mailto:npnog at npnog.org>
>> https://lists.npnog.org/listinfo/npnog
> 
> _______________________________________________
> npnog mailing list
> npnog at npnog.org
> https://lists.npnog.org/listinfo/npnog

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.npnog.org/pipermail/npnog/attachments/20170515/1359c717/attachment.html>


More information about the npnog mailing list