- Joined
- Apr 5, 2005
- Posts
- 9,729
- Reaction score
- 1,311
Microsoft has issued a patch against the current ransomware worm for Windows XP and other older systems that don't normally get patched any more.
https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/
Also, whatever you do, don't block the domain name iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com on your firewall or elsewhere. It's a "kill switch" for the current strain of malware - so long as the worm can connect to it, it will remain dormant.
Realistically speaking, you'll want to make upgrading your OS more of a priority after this though - their solution won't stop variant attacks or other ransomware worms. And I expect that, after the headline publicity around the world, other attackers will use similar propagation tactics to spread their infections faster than ever, so we can sadly expect the frequency of such attacks to increase.
Generally, you can protect your system by:
1) Running an up to date OS (Windows 7 or newer) i.e. one for which security patches are still being issued
2) Updating Windows regularly (either automatically, or manually 2-3 times a month)
3) Patching other software - especially stuff that gets frequently attacked - if you've got it installed. For example (not an exhaustive list)
- Adobe Flash https://get.adobe.com/flashplayer/ (untick the optional offers)
- Adobe Reader https://get.adobe.com/uk/reader/ (untick the optional offers)
- Microsoft Office (via Windows Update)
- Chrome, Firefox and other browsers (should be under the "Help" or "About" menu, or similar)
- Sun Java RE https://java.com/en/download/
- Apple iTunes https://www.apple.com/uk/itunes/download/ (untick the offer boxes)
4) Installing anti-virus/anti-malware software like Kaspersky etc.
5) Implementing a regular backup strategy, ideal one with multiple copies and/or "offsite" backup (on physical media such as removable HDDs or via one of the cloud backup providers). Ransomware will infect all hard drives it can "see" so it will also attack your backup drive if it's permanently connected.
None of the above is a silver bullet solution, but if you implement all of 1-4 you should be much, much safer than if you don't.
https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/
Also, whatever you do, don't block the domain name iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com on your firewall or elsewhere. It's a "kill switch" for the current strain of malware - so long as the worm can connect to it, it will remain dormant.
Realistically speaking, you'll want to make upgrading your OS more of a priority after this though - their solution won't stop variant attacks or other ransomware worms. And I expect that, after the headline publicity around the world, other attackers will use similar propagation tactics to spread their infections faster than ever, so we can sadly expect the frequency of such attacks to increase.
Generally, you can protect your system by:
1) Running an up to date OS (Windows 7 or newer) i.e. one for which security patches are still being issued
2) Updating Windows regularly (either automatically, or manually 2-3 times a month)
3) Patching other software - especially stuff that gets frequently attacked - if you've got it installed. For example (not an exhaustive list)
- Adobe Flash https://get.adobe.com/flashplayer/ (untick the optional offers)
- Adobe Reader https://get.adobe.com/uk/reader/ (untick the optional offers)
- Microsoft Office (via Windows Update)
- Chrome, Firefox and other browsers (should be under the "Help" or "About" menu, or similar)
- Sun Java RE https://java.com/en/download/
- Apple iTunes https://www.apple.com/uk/itunes/download/ (untick the offer boxes)
4) Installing anti-virus/anti-malware software like Kaspersky etc.
5) Implementing a regular backup strategy, ideal one with multiple copies and/or "offsite" backup (on physical media such as removable HDDs or via one of the cloud backup providers). Ransomware will infect all hard drives it can "see" so it will also attack your backup drive if it's permanently connected.
None of the above is a silver bullet solution, but if you implement all of 1-4 you should be much, much safer than if you don't.