comscore WannaCry ransomware: CERT-In explains measures to prevent infection, how to tackle the aftermath
News

WannaCry ransomware: CERT-In explains measures to prevent infection, how to tackle the aftermath

The WannaCry ransomware has currently affected 75,000 systems in over 100 countries.

cyber-crime

The WannaCrypt ransomware has managed to cause over 75,000 attacks in 100 countries with major alerts being issued everywhere. The ransomware, also known as WannaCry demands $300 in Bitcoin to unlock encrypted files and threatens users to permanently delete them for failure of payments. This malware can infect systems running on the same network and can also come through malicious attachments sent through emails. The Indian Computer Emergency Response Team (CERT-In), through a webcast has addressed all the issues of the WannaCry ransomware, from how it affects a user and organization and its safety measures. Also Read - Microsoft buys developers of Fallout, Wolfenstein, Doom, Elder Scrolls ahead of Xbox sales

Also Read - Xbox Series X, Series S pre-orders in India starting September 22

Also Read - Microsoft's Your Phone App gets new features with the latest update

The webcast posted by the CERT-in can be accessed by clicking here. As explained by the CERT-In, the WannaCry malware comprises of a worm and a ransomware package, and encrypts files on infected Windows systems. It can spread to other systems using the same LAN and also through malicious attachments. The ransom demand which was $300 is now said to have increased up to $600 in Bitcoin. Infected systems will receive a display message by the attackers on how to escape this ransomware by offering to pay the ransom demand. There s a timer as well showing how much time is left to complete the ransom demand. The desktop wallpaper will then change along with a text box explaining what has happened, and instructing users on how to complete the ransom demand.

The webcast shows a long list of file extensions and file formats which are prime targets of this ransomware. These file formats, extensions range from office data, media files, database files, encryption keys, virtual machine files and more. The Wannacry ransomware hides itself in a folder named ProgramData or in C Drive under the file name tasksche.exe . It also uses the filename mssecsvc.exe in C Drive location. It then grants access to all files in the system. ALSO READ: CERT-In issues red-alert over WannaCry cyber attack

The CERT-In has issued measures to prevent users and organizations both from the WannaCry ransomware attacks. The first and most important one is the security update issued by Microsoft today titled Microsoft Security Bulletin MS17-010 . This security patch had been rolled out in March for its operating systems. But this update is now available for unsupported operating systems like Windows XP, 8 and Server 2003. ALSO READ: Microsoft issues security patch for Windows XP, 8, Server 2003 after WannaCrypt ransomware attacks

General steps that users should follow to prevent ransomware of such should use anti-virus protection, block spam, and regularly backup data on offline platforms. Users shouldn t open malicious attachments even if they come from trusted contacts, and disable macros in Microsoft Office products. A detailed set of instructions are laid out for enterprises like blocking certain UDP and TCP port, deploying email validation systems, web and email filters, scan all emails, attachments and downloads. The CERT-In also advises keeping a backup of all the critical and important data and saving them offline. ALSO READ: No, I don t WannaCry, but we re all collectively responsible for a lot of pain around us

If a system is already infected by the WannaCry ransomware, then one should immediately isolate it from the network, run cleanup tools, preserve the data even if it is encrypted, and report the incident to CERT-In and the local law enforcement agency.

In addition to this, Mishi Choudhary, technology lawyer from Software Freedom Law Centre has also issued similar guidelines to remain safe from such ransomware attacks. He highlights how agencies and organizations have not been stringent with regular software updates and also how such a major attack was caused so easily and without the need of attacking something prime like a power grid.

He further points out the lack of security system in the most vulnerable platform in India, Aadhaar. He says, The lead agency has played defensive and offensive each time any researcher highlights flaws or leaks. It has shunned taking real action to plug in security holes and relied on PR or ad-hoc rules based arrangements to cure a design defect. We hope this cautionary take pushes us towards an honest and transparent discussion about vulnerabilities that a digitized society brings. ALSO READ: 135 million Aadhaar numbers made public by four government portals: CIS report

For the latest tech news across the world, latest PC and Mobile games, tips & tricks, top-notch gadget reviews of most exciting releases follow BGR India’s Facebook, Twitter, subscribe our YouTube Channel.
  • Published Date: May 15, 2017 1:48 PM IST
  • Updated Date: May 16, 2017 8:44 AM IST



new arrivals in india

Realme Narzo 20A
Realme Narzo 20A

8,499

Realme Narzo 20
Realme Narzo 20

10,499

Realme Narzo 20 Pro
Realme Narzo 20 Pro

14,999

Oppo F17
Oppo F17

17,990

Samsung Galaxy M51
Samsung Galaxy M51

24,999

Poco M2
Poco M2

10,999

Oppo F17 Pro
Oppo F17 Pro

22,990

Realme 7 Pro
Realme 7 Pro

19,999

Realme 7
Realme 7

14,999

Xiaomi Redmi 9A
Xiaomi Redmi 9A

6,799

Vivo Y20
Vivo Y20

12,990

Xiaomi Redmi 9
Xiaomi Redmi 9

8,999

Nokia 5.3
Nokia 5.3

13,999

Motorola Moto G9
Motorola Moto G9

11,499

Realme C15
Realme C15

9,999

Realme C12
Realme C12

8,999

Samsung Galaxy Note 20
Samsung Galaxy Note 20

77,999

Xiaomi Redmi 9 Prime
Xiaomi Redmi 9 Prime

9,999

Oppo Reno4 Pro
Oppo Reno4 Pro

34,990

Samsung Galaxy M01 Core
Samsung Galaxy M01 Core

5,499

Realme 6i
Realme 6i

12,999

Asus Rog Phone 3
Asus Rog Phone 3

49,999

OnePlus Nord
OnePlus Nord

24,999

Infinix Smart 4 Plus
Infinix Smart 4 Plus

7,999

Xiaomi Redmi Note 9
Xiaomi Redmi Note 9

11,999

Samsung Galaxy M01s
Samsung Galaxy M01s

9,999

Vivo X50 Pro 5G
Vivo X50 Pro 5G

49,990

Vivo X50 5G
Vivo X50 5G

34,990

Realme C11
Realme C11

7,499

Poco M2 Pro
Poco M2 Pro

13,999

Realme X3
Realme X3

24,999

Realme X3 SuperZoom
Realme X3 SuperZoom

27,999

Tecno Spark Power 2
Tecno Spark Power 2

9,999

Oppo A12
Oppo A12

9,990

Oppo A52
Oppo A52

16,990

Samsung Galaxy A21s
Samsung Galaxy A21s

15,999

Oppo Find X2
Oppo Find X2

64,990

Motorola One Fusion Plus
Motorola One Fusion Plus

17,499

Samsung Galaxy A31
Samsung Galaxy A31

20,999

Samsung Galaxy M01
Samsung Galaxy M01

8,999

Samsung Galaxy M11
Samsung Galaxy M11

10,999

Infinix Hot 9 Pro
Infinix Hot 9 Pro

9,999

LG Velvet
LG Velvet

Price Not Available

Xiaomi Mi Note 10 Lite
Xiaomi Mi Note 10 Lite

Price Not Available

Apple iPhone SE 2020
Apple iPhone SE 2020

42,500

Honor 30 Pro
Honor 30 Pro

Price Not Available

Honor 30
Honor 30

Price Not Available

OnePlus 8
OnePlus 8

44,999

OnePlus 8 Pro
OnePlus 8 Pro

54,999

Xiaomi Redmi Note 9 Pro
Xiaomi Redmi Note 9 Pro

13,999

Motorola Moto E4
Motorola Moto E4

8,999

Samsung Galaxy On Max
Samsung Galaxy On Max

9,775

nubia N2
nubia N2

15,999

Karbonn K9 Kavach 4G
Karbonn K9 Kavach 4G

5,290

Motorola Moto C Plus
Motorola Moto C Plus

6,999

Best Sellers