Well It looks like the day of reckoning is here for many businesses with the spread of the WannaCry ransomware (aka WannaDecryptor, aka WannaCryptor aka WCry). You may well wanna cry if you get this ransomware on your systems!
It encrypts the victim's files and holds them for ransom unless an amount is paid in bitcoin.
It has infected Tens of thousands of computers in over 75 countries as of recording and is spreading.
Watch it spread: https://comparite.ch/wannacry
So who is at risk? Anyone running Windows operating systems that are listed in the patch announcement here: https://technet.microsoft.com/en-us/library/security/ms17-010.aspx
The NCSC advise the following steps be performed in order to contain the propagation of this malware:
- Deploy patch MS17-010:
- A new patch has been made available for legacy platforms, and is available here:
- If it is not possible to apply this patch, disable SMBv1. There is guidance here:
- and/or block SMBv1 ports on network devices [UDP 137, 138 and TCP 139, 445]
If these steps are not possible, propagation can be prevented by shutting down vulnerable systems.
Work done in the security research community has prevented a number of potential compromises. To benefit:
- Ensure that your systems can resolve and connect on TCP 80 to the domains below.
Unlike most malware infections, your IT department should not block these domains. Note that the malware is not proxy aware so a local DNS record may be required. This does not need to point to the internet, but can resolve to *any* accessible server which will accept connections on TCP 80.
Antivirus vendors are increasingly becoming able to detect and remediate this malware, therefore updating antivirus products will provide additional protection (though this will not recover any data that has already been encrypted).