{"id":15985,"date":"2017-05-17T09:21:12","date_gmt":"2017-05-17T09:21:12","guid":{"rendered":"https:\/\/www.exabytes.sg\/blog\/?p=15985"},"modified":"2024-02-02T09:04:09","modified_gmt":"2024-02-02T01:04:09","slug":"how-to-protect-from-ransomware","status":"publish","type":"post","link":"https:\/\/www.exabytes.sg\/blog\/how-to-protect-from-ransomware\/","title":{"rendered":"3 Trusted Facts to Protect Yourself from WannaCry Ransomware Cyberattack"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-15991 size-full\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2017\/05\/Ransomware.png?resize=696%2C364&#038;ssl=1\" alt=\"how to protect from wannacry ramsomware\" width=\"696\" height=\"364\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2017\/05\/Ransomware.png?w=1200&amp;ssl=1 1200w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2017\/05\/Ransomware.png?resize=300%2C157&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2017\/05\/Ransomware.png?resize=768%2C402&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2017\/05\/Ransomware.png?resize=1024%2C536&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2017\/05\/Ransomware.png?resize=696%2C364&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2017\/05\/Ransomware.png?resize=1068%2C559&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2017\/05\/Ransomware.png?resize=803%2C420&amp;ssl=1 803w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n<h2><strong>What is WannaCry Ransomware ?<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">The WannaCry Ransomeware that swept the globe recently has proven so malicious. Many government systems were down because of this widespread cyberattack. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to <\/span><a href=\"http:\/\/www.thestar.com.my\/news\/nation\/2017\/05\/15\/cyber-security-expert-wannacry-ransomware-has-surfaced-in-malaysia\/\" rel=\"noopener\"><span style=\"font-weight: 400;\">LGMS founder C.F, Fong<\/span><\/a><span style=\"font-weight: 400;\">, the cyber security expert, one of his clients\u2019 companies personal laptop has already been infected with this ransomware. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">So, how can we protect our PCs from this terrible ramsomware?<\/span><\/p>\n<h2><strong>How Does WannaCry Ransomware Work?<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">The malware or \u201cWannaCry\u201d is delivered as a Trojan through a loaded hyperlink that can be accidentally opened by a victim through an email, advert on a webpage or a Dropbox link. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Once it has been activated, the program spreads through the computer and locks all the files with the same encryption used for instant messages.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Once the files have been encrypted it deletes the originals and delivers a ransom note in the form of a readme file.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It also changes the victim&#8217;s wallpaper to a message demanding USD300 in Bitcoin currency to return the files.<\/span><\/p>\n<h2>\u00a0<img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-15988 size-full\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2017\/05\/ransomware-world-attack-2.jpg?resize=650%2C486&#038;ssl=1\" alt=\"ransomeware file encrypted\" width=\"650\" height=\"486\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2017\/05\/ransomware-world-attack-2.jpg?w=650&amp;ssl=1 650w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2017\/05\/ransomware-world-attack-2.jpg?resize=300%2C224&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2017\/05\/ransomware-world-attack-2.jpg?resize=80%2C60&amp;ssl=1 80w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2017\/05\/ransomware-world-attack-2.jpg?resize=265%2C198&amp;ssl=1 265w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2017\/05\/ransomware-world-attack-2.jpg?resize=562%2C420&amp;ssl=1 562w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/h2>\n<h2><strong>What You Need to Know to Keep Yourself Secure<\/strong><\/h2>\n<h3>1) Update and Patching Microsoft Windows Operating System (OS)<\/h3>\n<p><span style=\"font-weight: 400;\">From time to time, Microsoft will release multiple security patches to protect your OS from cyberattack. In fact, <\/span><a href=\"https:\/\/blogs.technet.microsoft.com\/msrc\/2017\/05\/12\/customer-guidance-for-wannacrypt-attacks\/\" rel=\"noopener\"><span style=\"font-weight: 400;\">Microsoft released a security update<\/span><\/a><span style=\"font-weight: 400;\"> which addressed the vulnerability to \u201cWannaCrypt\u201d malicious software back in March 2017. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The vulnerability does not exist within Windows 10, the latest version of the software, but is present in all versions of Windows prior to that, dating back to Windows XP.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">2) Don\u2019t Open Any Malicious Email Attachments<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">This is another major way how the ransomware was spread. Once you click and download the attachment, your PC data will be encrypted and prompt to pay the ransom fee.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In fact, we recommend using caution when clicking directly on any links in email even if the sender is someone you know. Hackers are constantly innovating the malware to spreading more to public.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">3) Always Have Backups, Backups and Backups<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Prevention is better than cure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Instead of paying $300 to the hacker to unlock your important files on your PC, why don\u2019t have a full backup of your data &amp; system regularly? <\/span><\/p>\n<p><a href=\"https:\/\/www.exabytes.sg\/acronis\/backup\/server\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Exabytes Server Backup<\/span><\/a><span style=\"font-weight: 400;\"> offers easy-to-use disaster recovery and data protection solutions for physical, virtual and cloud environments.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While there are many backup solutions on the market, finding the one that truly gives you the protection you need is not easy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Acronis, an internationally renowned provider of backup and disaster recovery solution provider restores your data and system if attacked by cybercriminals. <\/span><\/p>\n<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-15989 size-full\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2017\/05\/payment.png?resize=696%2C522&#038;ssl=1\" alt=\"online payment methods\" width=\"696\" height=\"522\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2017\/05\/payment.png?w=1024&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2017\/05\/payment.png?resize=300%2C225&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2017\/05\/payment.png?resize=768%2C576&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2017\/05\/payment.png?resize=80%2C60&amp;ssl=1 80w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2017\/05\/payment.png?resize=265%2C198&amp;ssl=1 265w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2017\/05\/payment.png?resize=696%2C522&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2017\/05\/payment.png?resize=560%2C420&amp;ssl=1 560w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n<h2><span style=\"font-weight: 400;\">Pay the Ransom or Not?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">For those who have been infected, <\/span><a href=\"https:\/\/www.theguardian.com\/technology\/2017\/may\/15\/dont-pay-ransomware-demands-cybersecurity-experts-say-wannacry\" rel=\"noopener\"><span style=\"font-weight: 400;\">expert recommend not to pay the ransom<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Not only it does not guarantee restoration of any files, it also funds future crime.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You might be tempted to pay by Bitcoins to settle the trouble, but remember, the next variant of WannaCry is coming soon, as warned by many experts. <\/span><\/p>\n<h2><span style=\"font-weight: 400;\">This is Just a Warning<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Sadly, there is no confirmed fix for WannaCry ransomware available for this time.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So far, the Malaysian Communications and Multimedia Commission (MCMC) is yet to receive any official report of WannaCry attack. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, everyone should always stick to all the best practices to protect against ransomware and other types of cyberattacks. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cAlways have a <\/span><a href=\"https:\/\/www.exabytes.sg\/acronis\/backup\/server\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">backup plan<\/span><\/a><span style=\"font-weight: 400;\">.\u201d<\/span><\/p>\n<p>Read more about <a href=\"https:\/\/www.exabytes.sg\/blog\/wordpress-website-security-tips\/\">WordPress Website Security Tips<\/a> if you own a website.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is WannaCry Ransomware ? The WannaCry Ransomeware that swept the globe recently has proven so malicious. Many government systems were down because of this widespread cyberattack. According to LGMS founder C.F, Fong, the cyber security expert, one of his clients\u2019 companies personal laptop has already been infected with this ransomware. So, how can we [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":15991,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[262],"tags":[181,196],"class_list":{"0":"post-15985","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-all-about-exabytes","8":"tag-privacy","9":"tag-security"},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2017\/05\/Ransomware.png?fit=1200%2C628&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pbHhPQ-49P","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/15985","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/comments?post=15985"}],"version-history":[{"count":9,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/15985\/revisions"}],"predecessor-version":[{"id":28280,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/15985\/revisions\/28280"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/media\/15991"}],"wp:attachment":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/media?parent=15985"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/categories?post=15985"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/tags?post=15985"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}