Don’t make “WannaCry”… make you cry
That campaign has, during the weekend ending on 14th May 2017, infected over 10,000 organisations and 200,000 individuals in about 150 countries, with numerous victims impacted in countries such as Taiwan, Russia, Turkey, Germany, Vietnam, Japan, Spain, Ukraine, Philippines, Kazakhstan, Indonesia, among others. The whole National Health Service (NHS) in England was also infected by the ransomware.
This variant of the original Ransomware has been exploiting vulnerability in Windows and has wormlike capabilities - allowing it to spread by itself quickly. Like other ransomware, it attempted to encrypt files on computers hence making them unusable unless a ransom is paid. The threat extended to complete deletion of files if payment isn’t made within a week.
This is worthy of note: a sense of urgency is created to prompt victims into action.
Again, bitcoin - an untraceable digital currency - was the currency of choice for the ransoms, amounting to around US$300.
It was a scattershot attack rather than a targeted one, with a very broad spread. It was simply meant for just about anyone to get infected! True for most cases, ransomware doesn't tend to discriminate; all sorts of organisations, such as hospitals, train stations, businesses and hospitals around the world have been impacted.
Be sensible. Be in control…
Apply some basic precautions to counter the spread of the malware.
- Install Anti-Malware Software. Most softwares are now equipped with detection capability to block WannaCry.
- Update your Windows machines with available patches. In general, keeping your operating systems current will ensure your machine gets patches that fix bugs and close security loopholes.
- Backup your data regularly. Have offline backups too, that way ransomware can’t encrypt your backups.
- Remember to treat unexpected emails with caution, especially those with attachments.
- Keep abreast of what's happening. Knowing is half the battle!
The criminals have worked out how to monetize this crime. Other subsequent variants are therefore expected to hit. We hence urge you to take necessary measures to protect yourself and adopt the right habits daily to stand a chance to fight this ransomware or any other malicious attack.
Share this page to spread the news and help keep your friends and family secure.
Emails with a forged sender address to mislead the recipient about the origin of the message. Such emails are intended to defraud the receiver in inciting the latter to send money to a “relative/friend/supplier” for payment.
Spoofed emails claiming to be from Amazon.co.uk are regularly in circulation. Emails allege recipients have made an order online and mimic an automatic customer email notification. The link leads to an authentic-looking website, which asks victims to confirm their name, address, and bank card information.
1 Billion Yahoo! Account were compromised. The company has notified potentially affected users and has required people to change their passwords.
A recent and sophisticated scam targeting consumers by means of correspondence from their banks. The letter looks genuine and informs the recipient of "unusual transactions" on their personal current account. It then asks the customer to call a telephone number to "confirm the transactions are genuine.” The victims are requested by an automated service, to enter personal details like their card number, account number or their date of birth, and so on.
Fraudsters post pictures of items for sale that either do not exist or are counterfeit which results in buyers not receiving the purchased items.