Wazzup Pilipinas!
Fortinet,
a global leader in high-performance cyber security solutions, today advised organisations
and computer users to brace and take immediate action against a new
ransomware variant called Petya that is sweeping across the world. The
ransomware is currently having an impact on a wide range of industries and
organizations, including critical infrastructure such as energy, banking, and
transportation systems.
This is part
of a new wave of multi-vector ransomware attacks that we are calling
“ransomworm”, which takes advantage of timely exploits. The ransomworm is
designed to move across multiple systems automatically, rather than stay in one
place. It appears that the Petra
ransomworm is using similar current vulnerabilities that were exploited during
the recent Wannacry attack.
Unlike WannaCry which encrypts a
computer’s files, however, the Petya ransomware encrypts a segment of the hard
drive that renders the entire computer inoperable. Older legacy systems and
critical infrastructure are particularly vulnerable to this attack.
The patch for this vulnerability was
issued by Microsoft earlier this year. We advise organizations to update their
systems immediately.
In addition, here are a few other steps organisations
and individuals should take to protect themselves:
IT Department
·
Back up your critical systems’ files, and keep
that backup offline.
·
Ensure you have a ‘gold standard’ operating
system disk and configuration, to allow you to reconstruct your desktops with
confidence.
·
Patch.
·
Check the currency of your patches.
Users
·
Don’t execute attachments from unknown sources.
Security Operations
·
Push out signatures and antiviruses.
·
Use sandboxing on attachments.
·
Use behavior-based detections.
·
At firewalls, look for evidence of Command &
Control.
·
Segment, to limit the spread of the malware and
backup data being encrypted.
·
Ensure that Remote Desktop Protocol is turned
off, and/or is properly authenticated, and otherwise limit its ability to move
laterally.
General Guidance
·
If affected, do not pay the ransom
·
Share facts of infiltration with trusted
organizations such as the local police, to assist with overall community
efforts to diagnose, contain, and remedy the attack.
Further cautions and an analysis of the ransomware
landscape can be found here: http://blog.fortinet.com/2017/06/27/new-ransomware-follows-wannacry-exploits
Post a Comment