Customer Login

If you have an emergency, a question,
or just need advice, give us a call: (604) 980-2700

Netcetera
Cusomter Login

If you have an emergency, a question,
or just need advice, give us a call: (604) 980-2700

WannaCry Removal and How to Protect Your Data icon

WannaCry Removal and How to Protect Your Data

WannaCry is an aptly named virus that infects unpatched computer systems worldwide. It is widespread and WannaCry removal continues to be one of the most common requests against this damaging ransomware threat.

WannaCry removal and protection icon

Table of Contents

What is Wannacry?

WannaCry is an example of crypto ransomware, a type of malicious software used by cybercriminals to take your most valuable data hostage.  Once the ransomware infects your system, the perpetrators demand that you pay a Bitcoin ransom before allowing you access to your data. But beware , 42% of those who pay the ransom do not have their files released.

The WannaCry ransomware was designed to take advantage of vulnerabilities in Microsoft Windows systems that were not patched with the latest update.  Patches are a type of code that is inserted (or patched) into the code of an existing software program and it is up to the user to ensure the patch is installed.

Every few weeks, Microsoft issues updates meant to fix malfunctioning bits of code, add features or perhaps, most importantly, to protect computers against security vulnerabilities exploited by ransomware like WannaCry.

How does Wannacry infect?

WannaCry infects your system by either encrypting valuable files so you are unable to read them, or by locking you out of your computer completely.

WannaCry access happens most often through a phishing email with an attachment that you are asked to download. Sometimes the phishing email will ask you to click on a link. Once you have downloaded the attachment or clicked the link, WannaCry, (or any other form of ransomware), will infect and corrupt your computer.

WannaCry can also infiltrate when a user unknowingly visits an infected website where malware is downloaded and installed without the user’s knowledge. This is called drive-by downloading.

How does Wannacry spread?

WannaCry spreads throughout your computer’s system encrypting your files and scrambling their names. It is particularly happy when it discovers links to shared networks. The WannaCry worm goes after a particular vulnerability in Windows’ Server Message Block (SMB) protocol used by devices to communicate on a shared network. It is searching for any PC with its Samba TCP port 445 accessible.

If you aren’t on a shared network, WannaCry will be content to encrypt your personal files and send you a ransom note.

How to protect against WannaCry?

You can protect your data against WannaCry with a few important steps.

First, always be sure to install any security updates (patches) to Microsoft Windows as soon as they are available. If you are running older versions of Windows, check for past updates you may have missed and install them immediately. The patches remain available for Windows XP and Vista.

Install up-to-date antivirus protection such as Sophos Home Premium. A good antivirus program is key to ensuring your home computer systems are safe against rapidly evolving ransomware threats.

Always backup your files, and do so once a week – or more often if you have lots of new daily work on your desktop. An external drive or cloud storage are easily accessed and affordable. A small home business would benefit from Datto’s security, back up and file restoration services. As would anyone working remotely from home.

How to remove WannaCry?

You can remove WannaCry from an infected computer using the following steps:

1.

Disconnect all devices on your network – your Wifi, smartphone, tablet, and all other household computers.  Pull the plug out of your Wifi router, pull the ethernet cables out of your computer. Isolate it from the web as soon as possible.

2.

Also disconnect external drives, cloud storage, flash drives, and network drives. You want to isolate the infection and stop it from spreading.

3.

 

Ensure that the ransomware you are removing is, in fact, WannaCry. Identifying the ransomware will help you understand what type of ransomware you have, how it spreads, what types of files it encrypts, and help you understand what your options are for removal and disinfection. It also will enable you to report the attack to the authorities, which is strongly recommended. Some of the most common indicators are as follows:

  • Ransomware note
  • Encrypted files
  • Renamed files
  • Locked browser
  • Locked screen
4.

The Sophos Virus Removal Tool is a free download, and will identify and remove malware from a single Windows endpoint computer. The tool comes with the latest identities included. In order to stay current with the latest detections, the tool should be downloaded again when a new scan is required.

5.

If you have a complete backup of your system and files, wipe your computer hard drive completely then restore it from your last saved, clean, (pre virus) back up.

Further analysis of WannaCry:

This crypto ransomware also known as WannaCry, WCry, WanaCrypt, and WanaCrypt0r – shows that it encrypts victims’ files and changes the extensions to .wnry, .wcry, .wncry and .wncrypt.  Perpetrators of the ransomware demand an escalating ransom payment for the encryption key required to recover your data.

Although WannaCry may be the largest single global ransomware attacker, the story is a familiar one.  And, so are the responses from many Windows users who are not adequately protected:

  • How did this happen?
  • Why me?
  • What could I have done to prevent this?
  • Whose fault is this?
  • What is this going to cost me?
  • Why did my backup not work?

The bottom line is many small business owners are still treating IT security as if they were in the late 1990’s.  They purchase the lowest cost antivirus solution they can find, put a firewall in the back room and never touch it again.  They install PCs and servers and either never patch them or patch them only occasionally and randomly.  They put in a backup solution and never test that it is actually working.  They do not pay attention to security measures for their shared users and they do not enforce policies like strong passwords, changed regularly.  The list goes on…

Steps you can take to protect your critical files right now

  • If you have not done so already, install all critical and security related updates on your existing Windows systems.  Start with Microsoft Security Bulletin MS17-010 to secure your devices against the WannaCry malware.
  • For older unsupported Windows versions such as Windows XP and Server 2003, Microsoft has updates, which can be found at the Security Update Guide.
  • If you are running MACs, update those as well.
  • Ensure all your devices have antivirus installed and that it is up to date.  Then check with your provider to confirm that it will protect you against known WannaCry variants. If you don’t know who to call, call us at Netcetera, we will assist you.
  • Make sure you have a current commercial grade firewall running security licenses that include IPS (Intrusion Prevention) at a minimum.  Ensure it is properly configured and running up to date firmware.  We use SonicWALL and Sophos firewalls.  Both will protect against the known WannaCry variants when running IPS and up to date firmware.   However, the likelihood of new attacks, based on the leaked exploits, is high so things can change rapidly no matter what you are running.  The addition of a sandboxing service like SandStorm  is easy to do and highly recommended.
  • If you are not sure about your AV, consider adding a product called InterceptX from Sophos.  It is the most advanced anti-ransomware protection we have seen and it has been 100% effective so far.  Even if you are not running a Sophos AV solution you can still add InterceptX.  It will run in harmony with your current AV solution
  • A good backup is your last line of defense; make sure you have one. Consider adding a Datto (or similar) Backup & Disaster Recovery solution to protect your data if, despite your best efforts, you are compromised.
  • Review the security blogs on the Netcetera website, several are relevant
  • Use strong passwords with regular changes (every 3 months recommended). Never use the same password for another website.
  • If you do not have mail filtering, consider adding it as another layer of defense.
  • Consider signing up for the Sophos Home Premium beta, which adds proactive protection against exploits and ransomware and it’s free for the first year.

If you are a current Netcetera Managed client we have already taken care of this for you.  If you are not a managed Netcetera client and need assistance or just some advice, give us a call.  There is no cost to have a conversation and it just may save you from some unnecessary grief and potential losses. 

Get a Free Assessment

Tell us more about your business and we'll show you how to protect it from the interruption and financial losses caused by Ransomware and other disasters.

  • This field is for validation purposes and should be left unchanged.

两个鬼故事写给未来自己的一封信给公司起名名字打分正规起名物业公司榻榻米地台孩子起名的古诗词鹿鼎记黄晓明版剧情莒县紫光阁起名馆唐氏取名大全男孩起名木字旁起名女孩魔兽争霸版本转换器九死丹神诀zaixianshipin实习总结宝宝公司起名免费免费起名有哪些网站蒸菜馆起个什么名氏傅起名龙背上的骑兵2千金记忍者村大战2.3金融公司怎么起名字起名哪家系带火的起名字沈阳是谁起的名字秋日之空本地网络科技公司起名农行理财产品彤字起名字罗生门啥意思芝加哥公牛队少年生前被连续抽血16次?多部门介入两大学生合买彩票中奖一人不认账让美丽中国“从细节出发”淀粉肠小王子日销售额涨超10倍高中生被打伤下体休学 邯郸通报单亲妈妈陷入热恋 14岁儿子报警何赛飞追着代拍打雅江山火三名扑火人员牺牲系谣言张家界的山上“长”满了韩国人?男孩8年未见母亲被告知被遗忘中国拥有亿元资产的家庭达13.3万户19岁小伙救下5人后溺亡 多方发声315晚会后胖东来又人满为患了张立群任西安交通大学校长“重生之我在北大当嫡校长”男子被猫抓伤后确诊“猫抓病”测试车高速逃费 小米:已补缴周杰伦一审败诉网易网友洛杉矶偶遇贾玲今日春分倪萍分享减重40斤方法七年后宇文玥被薅头发捞上岸许家印被限制高消费萧美琴窜访捷克 外交部回应联合利华开始重组专访95后高颜值猪保姆胖东来员工每周单休无小长假男子被流浪猫绊倒 投喂者赔24万小米汽车超级工厂正式揭幕黑马情侣提车了西双版纳热带植物园回应蜉蝣大爆发当地回应沈阳致3死车祸车主疑毒驾恒大被罚41.75亿到底怎么缴妈妈回应孩子在校撞护栏坠楼外国人感慨凌晨的中国很安全杨倩无缘巴黎奥运校方回应护栏损坏小学生课间坠楼房客欠租失踪 房东直发愁专家建议不必谈骨泥色变王树国卸任西安交大校长 师生送别手机成瘾是影响睡眠质量重要因素国产伟哥去年销售近13亿阿根廷将发行1万与2万面值的纸币兔狲“狲大娘”因病死亡遭遇山火的松茸之乡“开封王婆”爆火:促成四五十对奥巴马现身唐宁街 黑色着装引猜测考生莫言也上北大硕士复试名单了德国打算提及普京时仅用姓名天水麻辣烫把捣辣椒大爷累坏了

两个鬼故事 XML地图 TXT地图 虚拟主机 SEO 网站制作 网站优化