Best practices for protecting against WannaCry ransomware

What is ransomware ?


Malicious software that locks a device, such as a computer, tablet or smartphone and then demands a ransom to unlock it.

The message that flashed up on hundreds of thousands of screens infected by the WannaCry virus over the last few days demanded payment of $300 (275 euros) in Bitcoin, saying: “Ooops, your files have been encrypted!”. It warned that if payment was not made within three days the price would double, and if none was received within seven days the locked files would be deleted.Bitcoin is digital cash. The transactions are totally anonymous and non-refundable. However, they are totally traceable. “All the transactions are stored in databases called blockchains. It’s anonymous but anyone can monitor a bitcoin address.Bitcoin doesn’t need a bank so this monetary flow escapes any supervision and any checks. The accounts don’t have a physical address or a bank address and they are not stored centrally anonymity comes before anything else.”




What does ransomware do?


They can target any PC users, whether it’s a home computer, endpoints in an enterprise network, or servers used by a government agency or healthcare provider.
Ransomware can:
·         Prevent you from accessing Windows.
·         Encrypt files so you can't use them.
·         Stop certain apps from running (like your web browser).
Ransomware will demand that you pay money (a “ransom”) to get access to your PC or files. We have also seen them make you complete surveys.
There is no guarantee that paying the fine or doing what the ransomware tells you will give access to your PC or files again.

There are different types of ransomware. There are two types of ransomware in circulation Encrypting ransomware & Locker ransomware .

1: Encrypting ransomware which incorporates advanced encryption algorithms. It’s designed to block system files and demand payment to provide the victim with the key that can decrypt the blocked    content. Examples include CryptoLockerLockyCrytpoWall 

2: Locker ransomware, which locks the victim out of the operating system, making it impossible to access the desktop and any apps or files. The files are not encrypted in this case, but the attackers still ask for a ransom to unlock the infected computer. Examples include police-themed ransomware or Winlocker.


In most instances ransomware is automatically downloaded when you visit a malicious website or a website that's been hacked.


1: Install and use an up-to-date antivirus solution (such as Microsoft Security Essentials).

2: Make sure your software is up-to-date.


4: Ensure you have smart screen (in Internet Explorer) turned on.


6: Regularly backup your important files.
There is no known tool to decrypt the files encrypted by CryptoLocker. One good safe computing practice is to ensure you have accurate backups of your files. The 3-2-1 principle should be in play: three copies, two different media, one separate location. Windows has a feature called Volume Shadow Copy that allows you to restore files to their previous state, and is enabled by default.Cloud storage services can be a useful part of your backup strategy.

7: Always check who the email sender is If the email is supposedly coming from a bank, verify with your bank if the message is legitimate. If the email came from a personal contact, confirm if your contact sent the message. Do not rely solely on trust by relationship, as your friend or family member may be a victim of spammers as well. (like “PayePal” instead of “PayPal”) or unusual spaces, symbols, or punctuation (like “iTunesCustomer Service” instead of “iTunes Customer Service”).

8: Double-check the content of the message
There are obvious factual errors or discrepancies that you can spot. Example, if your bank or a friend claims that they have received something from you, try to go to your recently sent items to double-check their claim. Such spammed messages can also use other social engineering lures to persuade users to open the message.

9: Refrain from clicking links in email
In general, clicking on links in email should be avoided. It is safer to visit any site mentioned in email directly. If you have to click on a link in email, make sure your browser uses web reputation to check the link, Clicking on malicious or bad links in emails, Facebook, Twitter, and other social media posts, instant messenger chats, like Skype
. Often fake emails and webpages have bad spelling, or just look unusual. Look out for strange spellings of company names.

10: Disable Macros on Office Documents
Beware of email attachments that request you to enable macros. Malicious actors can hide macro malware in Microsoft Word or Microsoft Excel documents. These malicious documents are sent as spam email attachments, or inside ZIP files attached to spam emails. They use files names designed to entice you into opening them.

11:Disable ActiveX for Better Browser Security
Intended as a means of mediating between Java and Flash interactions (animations, multimedia content, etc.) on certain websites and Microsoft’s Internet Explorer, Edge and third-party browser applications based on the Explorer engine, ActiveX has long been a source of worry to champions of cyber-security. In the wrong hands, ActiveX may readily provide an avenue for malicious software to gain access to your system.

12:Install a popup blocker
A browser extension that blocks third-party popup ads can keep you on the safe side as well. Such add-ons address the risk of drive-by downloads, where users are duped into clicking something that looks harmless, but the interstitial or in-page ad triggers an obfuscated malware download routine in the background.

13:Disable Ports 135, 137-139, 445 

a. Press Windows key + W and type Windows Firewall.
b. Click on Windows Firewall.
c. Click on Advanced Settings on the left side.
d. In the new window, click on New Rule, located to the top right side of the window.
e. Select Port and click on Next.
f. Specify the port you wish to disable and click Next.
gSelect Block the Connection and follow the on-screen instructions.

Microsoft solution for Ransomware Attack 

Apply security update immediately for Windows XP, Windows Vista,Windows Server 2003 Windows 7 32 Bit & 64 Bit ,Windows 8 32 Bit & 64 Bit.



In March, we released a security update which addresses the vulnerability that these attacks are exploiting. Those who have Windows Update enabled are protected against attacks on this vulnerability. For those organizations who have not yet applied the security update, we suggest you immediately deploy Microsoft Security Bulletin MS17-010.
For customers using Windows Defender, we released an update earlier today which detects this threat as Ransom:Win32/WannaCrypt. As an additional “defense-in-depth” measure, keep up-to-date anti-malware software installed on your machines. Customers running anti-malware software from any number of security companies can confirm with their provider, that they are protected. If you turn on a system without the MS17-010 patch and TCP port 445 open, your system can be ransomwared.
Also Watch  video for WannaCry Ransomware.





Popular posts from this blog

Step by step configuration of Exchange 2010 Edge Transport server

Computer Equipment Disposal policy

Audit your computer using Helix Incident response Live CD