hot topic

Wannacrypt / Wannacry / Wannacrypt0r Ransomware : User Information

The following information is correct as of 8AM Monday 15th May 2017.

  • If you are running Windows 10 you will not be affected. No action required. *
  • If you are running Windows 7 or 8.1 with automatic updates on ( you know, those things that stop you getting on with your work for a few minutes once a month ) you will not be affected. No action required.
  • If you are running Windows 7 or 8.1 with automatic updates OFF you are at risk. Turn off the machine and seek advice.
  • If you running Windows 7 or 8.1 machine that has not been turned on since mid March you are at risk. Do not turn on the machine and seek advice.
  • If you are running Windows XP or Vista you are at risk. Do not turn on the machine and seek advice.

The initial attack which started on Friday 12th May has been “killed” but new versions of the malware are already on the loose. The antivirus makers will be updating their virus definitions as quickly as possible but you cannot rely on AV to thwart this sort of attack. A security product with a good behaviour blocker ( which watches your PC for unusual events that would not occur in everyday use ) such as Emsisoft Antimalware has proven effective but this may not always be the case.

For more detailed and up-to-the-minute information visit https://www.malwaretech.com and https://www.bleepingcomputer.com/tag/wanacrypt0r/

* Source : “Around January this year, Microsoft was tipped off by persons unknown that the NSA’s Eternalblue cyber-weapon, which can compromise pre-Windows 10 systems via an SMBv1 networking bug, had been stolen and was about to leak into the public domain.”

Source : “Windows 10 machines were not subject to the vulnerability this patch addressed and are therefore not at risk of the malware propagating via this vector.”