WA DCU Bulletin B-17-12 WannaCry Ransomware Exploit

The DCU released bulletin B-17-12 regarding the recent WannaCry Ransomware.

WannaCry Ransomware Exploit

As you probably are aware, a widespread ransomware campaign is affecting various organizations with reports of a large number of infections in many countries, including the United States. Currently, the latest version of this ransomware variant is recognized as WannaCry, WCry, or Wanna Decryptor.

Per the United States Computer Emergency Readiness Team “US-CERT” alert (TA17-132A – linked provided below) revised, May 15, 2017, initial reports indicate the hacker or hacking group behind the WannaCry campaign is gaining access to enterprise servers either through Remote Desktop Protocol (RDP) compromise or through the exploitation of a critical Windows SMB vulnerability. Microsoft released a security update for the MS17-010 vulnerability on March 14, 2017. Additionally, Microsoft released patches for the Windows XP, Windows 8, and Windows Server 2003 operating systems on May 13, 2017. According to open sources, one possible infection vector is via phishing emails.

The recommended step for prevention is to ensure that the Microsoft security patch for the MS17-010 SMB vulnerability dated March 14, 2017 is applied.

See the associated US-CERT alerts for additional information.

Below are some relevant publications to provide further assistance in addressing WannaCry Ransomware:

Passwords to access the blog posts, and blog posts are only for NWCG owners and retained clients. These should not be shared outside of the credit union. Blog posts generally contain only a summary of any requirements, and do not represent all potential impact on the credit unions. For further details on any blog post, contact NWCG or references cited in the blog post. The information contained on this site is provided for informational purposes only, and should not be construed as legal advice.

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *