Wannacry Ransomware Attacks Over Mother's Day Weekend

WannaCry Ransomware IPS Attack 2017By now, I’m sure you’re aware of the WannaCry ransomware strain (also known as WanaCrypt0r and Wcry), which broke out over this past weekend. It is currently distributed via a Windows operating system vulnerability in the SMB protocol, and has infected networks in 150 countries worldwide.

A lot has happened in a short amount of time, so we want to make sure you have the most current information and a better understanding of how to protect your network. Here goes:

  • First and foremost: Patch your systems. Although the exploit(s) used in the distribution of this ransomware is new (at least new to the public), the vulnerability is not, and a patch was released by Microsoft back in March (see the link below to Microsoft’s original post.) It takes advantage of SMBv1, so make sure all your Microsoft systems are patched, up-to-date, and using a more modern version of SMB.
  • If you’re a Sentinel customer, Sentinels have measures in place to stop and alert on this exploit, and other related exploits from the Shadow Brokers’ release of alleged NSA tools a few weeks ago. If you are looking for these alerts on your Sentinel, search your Activity page for the terms ‘ETERNAL’ or ‘Shadow Broker’. Of course, we are currently contacting customers that appear to be affected.

Here are some good resources for more information on the issue:

We hope you found this update useful. Remember, layered security is always your best protection against nefarious attacks.

Put Us In Your Corner.

We back you up with managed threat protection, visibility, and support, 24/7.