wanna cry

Petya Virus - Another Virus in the Wild and how to keep safe

Another Cyrptovirus has reared it's ugly head in the wild called Petya. It's already infected an Ukrainian Bank , DLA Pipa Law Firm in the USA and a few other agencies.

So far there has been no kill switch found to stop mass infection.

It utilises the same flaws that Wanna Cry used with SMB 1 so if you have already disabled this you should be some what protected. This virus gets into organisations through Email to Spam Filters behind your email servers are a real time defense against these new virus as well as up to date Windows and anti Virus on your Firewall.

Important Note per below :

Wanna Cry Virus - What you need to know!

Cyprtolocker Variances such as the recent "WannaCry" have been around for years. The main reason this hit the news headlines is of big outbreaks across the NHS and other global organisations.

Per below we've put together a list of things you can do to mitigate this for this strain and other strains : 

http://www.response-it.co.uk/news/2016/10/27/ransomware-the-small-business-guide?rq=Cryptolocker

Install the MS17-010 update that patches the vulnerability in Windows

Done with finding out the version? Here are the links to the updates for all of the Windows versions for which it has been released. Note that if you aren’t sure if you use 32-bit or 64-bit version of Windows, you can simply download both patches — one of them will work for you; trying to run the wrong one will bring up an error box but will do no harm.

 

 

You can also be extreme and disable SMB 1 totally from your network however careful with this as things such as VCentre use this for domain authetnication! 

Microsoft have put together a full list here thats uses SMB1

https://blogs.technet.microsoft.com/filecab/2017/06/01/smb1-product-clearinghouse/