Staying on top of the malware, known as Wanna, Wannacry, or Wcry

Over the weekend, you may have seen the headlines about a large ransomware worm bouncing from computer to computer across the world. In response to this, we wanted to keep our valued customers and partners informed about the situation. Below you’ll find a handful of resources to help you understand the situation as well as practical advice on how to address it.

An overview of the situation
This article provides a great recap of what is going on with the the malware, known as Wanna, Wannacry, or Wcry:

An NSA-derived ransomware worm is shutting down computers worldwide

What is a worm?
A worm is a piece of code that replicates without human activity, so it is especially dangerous.

What can you do?
While the best time to patch all your various Windows systems was March for this bug. The second best time to patch is now. Additionally, shutting down SMBv1 on Windows servers limits the damage. The command line for doing just that can be found here:

C:\> dism /online /norestart /disable-feature /featurename:SMB1Protocol
https://twitter.com/wincmdfu/status/863820196825387008


Get proactive
All of our managed IT services packages include network monitoring and patching and updating, so you don’t have to spend time worrying whether or not you’re up to date.

Stay tuned
As we encounter more resources that will help you troubleshoot any issues, we will share them in the comments below.

Thank you,
Your friends at ISG Technology

4 replies
  1. Miles Franz
    Miles Franz says:

    Protecting ourselves by best practice patching and definition updates should be standard operating procedure at this point. I think it is time to shift the discussion to adopting best practice data protection procedures. Backing up, creating point in time snap shots of data on key assets, such as servers and laptops, is the only way to protect ourselves from the time gap between new malicious software entering the wild and the point in time when the security manufacturers identify the event. The protection technologies exist to backup and protect data regardless of whether or not it is on a laptop, desktop or server. Question is….are you protecting that data?

    Reply

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *