Follow us at
Sapient Coach
  • Blog
  • Services
  • Contact
  • EspaƱol

First Line of Defense Against WanaCry Ransomware

5/15/2017

0 Comments

 
SapientCoach WannaCry Ransomware Decryptor
​WannaCry or Wanna Decrytor ransomware is an informatic virus that attacks Windows operating system based computers primarily (including servers) by taking advantage of system vulnerabilities exploited by Eternalblue, a tool believed to be developed by the USA National Security Agency. What is the unique effect once infected by the virus? Well, you will notice it fast. The system will show you a Popup window letting you know that your computer is infected, all your files are encrypted, and for you to recover it all, they require a ransom payment using bitcoins. Unless you make the payment, all your files will stay encrypted. The worst thing about this virus is that, if you do not pay in a certain period, the ransom payment will keep rising.
But, wait! The intention of this article is not to create panic. Even though you should panic if your computer got infected and you didn't backed up your files recently (last day or night before the infection). 
Your first line of defense against WannaCry is awareness, or to be conscious that anyone can get infected by this and many other viruses and cyber-attacks. What does this mean? Well, that by knowing that you can get infected, you could prevent it. Now the question is how to prevent an attack? By knowing how infections occur.
 
The ransomware primarily works by phishing the victims through e-mails campaign, using some sort of social engineering, and/or sending an infected file. With social engineering, the victim get a “legit” e-mail from an apparently known sender, like a credit card issuer or a financial institution letting he/her know that he/she needs to take immediate action by updating or changing some facts/data about his/her account, because his/her information has been compromised. The attacker creates this psychological urgency and the victim response the email by clicking the sent link, which could be an institution fake web page/portal that looks similar or identically to the legit institution where the victim submits the requested information (social security, birth date, postal and/or physical and postal addresses, full name, etc.).  You should know that no company will request these actions by e-mail. In the worst-case scenario, they will call you directly or ask you to visit one of their branches or offices.  Another thing to consider is to look carefully at the sender's e-mail address, and to check after the ampersand domain. For example, if the recipient is someone from gmail, its email domain should be johndoe@gmail.com not johndoe@ggmail.com, johndoe@jmail.com, or any sort of variations that looks or phonetically sounds like the original one.  In addition, you should verify the web page address that the attacker directs you to. Let’s say that you should be on www.sapientcoach.com, but you can notice minor differences like www.saplentcoach.com (there is a lowercase "L") or www.sapientc0ach.com (there is a number "0"). Sometimes, the preferable and easiest way for attacker to get full control of the victims' computers is by sending attached files (executables, installers or images, among others), which once downloaded or ran, will infect the computer.
 
Another commonly used way to attack is by infecting portable storage devices, better known USB drive/pen drive. Let's say you found a portable pen drive, with 128 GB of storage capacity, and a USB type 3 model.  You will think that you are so lucky and will plug it into your computer and, pum! You got infected. Never insert a found pen drive in your computer, unless it is an isolated and protected one, where you can check for viruses and infections.
 
So, to prevent an infection, you should follow these recommendations:
  1. Never provide personal and institutional information through e-mails or web pages.
  2. Check for fake portal or web pages.
  3. Never click on hyperlinks/content inside your e-mails, if you have doubts about its origins.
  4. Never download attachments from unknown recipient or emails.
  5. Never plug in or insert found pen drives.
  6. Keep your system and applications updated with latest patches and/or versions.
  7. Have an updated antivirus, antispam and antimalware in place.
  8. Keep reading news, blogs, and technology portals.
  9. Backup your files on a regular basis (daily, if possible).
  10. Check other recommendations in this blog (SapientCoach.com) 

​Author: Gilberto Crespo, MSCE, CDIA+, CIP, ITILv3
Computer Engineer & Technology Blogger
0 Comments

Your comment will be posted after it is approved.


Leave a Reply.

    Gilberto Crespo

    Author

    Dr. Gilberto Crespo is an information security researcher & technology expert.

    He has been working for more than 20 years in the information technology industries, cybersecurity, financial, higher education, and life coaching.  He is also a motivational and leadership speaker.

    View my profile on LinkedIn

    Archives

    June 2022
    January 2021
    May 2019
    April 2018
    March 2018
    July 2017
    May 2017
    February 2017
    September 2016
    July 2016
    April 2016
    March 2016
    January 2016
    December 2015
    November 2015
    August 2015
    June 2015
    May 2015
    February 2015
    January 2015

    Categories

    All
    Android
    Apple
    Business
    Certification
    CloudComputing
    Coaching
    Computers
    Covid19
    Cyber
    Cybersecurity
    Education
    Employment
    Faith
    Goals
    Google
    Hackers
    Heaven
    Homeopathy
    Inspiration
    IOS
    IoT
    Jobs
    Microsoft
    Motivation
    Nature
    Online
    Potions
    Publication
    Remedies
    Research
    Security
    Skies
    Sun
    Technology
    Tips
    Work
    Zombies

    Subscribe to email updates, it's FREE

    *required

Copyright © 2023.  This site is part of Sapient Coach © 2023.  All rights reserved.  All content posted on this site is a commentary or an opinion, and is protected by freedom of expression.  Sapient Coach is not responsible for content written by contributing authors.  The information in this blog is provided for educational and informational purposes only.  It is not intended as a substitute for professional advice of any kind.  Sapient Coach © assumes no responsibility for the use or misuse of this material.  The use of this web site indicates your acceptance of these terms.  All brands, trademarks and service marks mentioned on this site are the property of their respective owners.

Designed by Blig Consulting

BligConsulting.com