Security Awareness : WannaCrypt ransomware attack

Security Awareness : WannaCrypt ransomware attack

170
0
SHARE
Linux Reseller Hosting

 

 

You maybe aware of the recent cyber attack affecting millions of computer systems throughout the world due to a vulnerability in the SMB/CIFS protocol on Windows operating systems. These attacks known as ransomware, encrypt files of the target system making them inaccessible to the user before demanding payment in return for decrypting the files.

For clients that have managed servers (VPS, dedicated and cloud) you need take no action, we will be  performing updates on all systems to ensure they are fully up to date.

For clients that are self-managed please ensure you have applied the latest patches.

Self managed clients can also mitigate their risk by disabling SMB file sharing on your Server, you can do this as follows:

(Applies to Windows server 2008, 2008 R2, 2012, 2012 R2 and  2016)

1) Open Server Manager and then click the Manage menu and select Remove  Roles and Features.

2) In the Features window, clear the SMB1.0/CIFS File Sharing support check box, and then click OK to close the window.

3) You will then need to restart the system.

Desktop operating systems (Windows XP, Vista, 8, 8.1 and 10)

We also recommend clients ensure their desktop systems are also patched by applying the latest windows updates.

You can also mitigate your risk by disabling SMB file sharing as follows:

1) Open Control Panel, click Programs, and then click Turn Windows features on or off.

2) In the Windows Features window, clear the SMB1.0/CIFS File Sharing Support checkbox, and then click OK to close the window.

3) Restart the system.

Windows XP
Microsoft have also taken the unusual step of providing a patch for Windows XP, this can be downloaded from the link below:

http://www.catalog.update.microsoft.com/Search.aspx?q=KB4012598

Conclusion

While we have no evidence that any of our servers have been infected we are taking all possible steps to ensure our clients are protected and would request that you contact our support team should have any queries or require any assistance.

References:

https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/
https://technet.microsoft.com/en-us/library/security/ms17-010.aspx
https://isc.sans.edu/forums/diary/ETERNALBLUE+Windows+SMBv1+Exploit+Patched/22304/
https://isc.sans.edu/forums/diary/Massive+wave+of+ransomware+ongoing/22412/

Kind regards,
Support Team

Windows Shared Hosting

Our Partner

partner-cloudflare
partner-cloudlinux
partner-cpanel-whm
partner-Paralleles-plesk-panel
partner-sitelock
partners-OpenVZ
R1Soft
partners-RV-Globalsoft
partners-Softaculous-auto-installer
partners-solusvm
partners-whmcs
services-cpanel
services-MySQL
services-Perl
services-swsoft-plesk
support-sevices-php