What is happening? In mid-April 2017, hacking tools alleged to have been developed by the NSA were released to the public. These tools exploit a flaw in all versions of the Microsoft Windows operating system. Microsoft had released updates in March 2017 to correct the flaw in supported versions of Windows. On Friday, May 12, a ransomware worm named “WannaCry” attacked hundreds of thousands of computers in approximately 150 countries by exploiting this vulnerability. While the initial malware outbreak was stopped by a security researcher, we expect more attacks given the pervasiveness of the flaw.
Who is at risk? Any computer running the Microsoft Windows operating system.
What you can do to protect your Windows computer:
- Ensure that you have the most up to date security patches installed on your Windows operating system. It is recommended that you enable auto updates to ensure your system is always up to date. A reboot is needed for the update to take effect. Computers on-campus in the NEXUS domain should already have this update applied.
- For users running Windows XP, Windows 8, or Windows Server 2003 follow the directions laid out by Microsoft at: https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/
- If you are unable to update your system, then turn off SMBv1
- Be cautious of any suspicious email you receive. Under no circumstances should you open or extract unexpected zip files, run any files contained within the attachment, or click on links within the email. Doing so allows the malware access to your machine, which will render it unavailable until fixed. This process can take 1-2 business days.
How to protect Windows servers: Consider using Windows Firewall for additional protection. It is recommended that you deny inbound connections by default, and allow connections only specifically required.
- Microsoft security bulletin: https://technet.microsoft.com/en-us/library/security/ms17-010.aspx
Questions or concerns? Contact the IST Service Desk, firstname.lastname@example.org or ext. 44357.