The requested article has expired, and is no longer available. Any related articles, and user comments are shown below.
© 2017 AFPResearcher finds 'kill switch' for cyberattack ransomeware
By Kate BARTLETT HONG KONG©2024 GPlusMedia Inc.
The requested article has expired, and is no longer available. Any related articles, and user comments are shown below.
© 2017 AFP
8 Comments
Login to comment
Michael Werker
If you make regular backups of your most important data this won't affect you.
Jason Santana
What's not mentioned in these articles in that this particular ransom ware also targets any drives connected to the computer encrypting everything. It could potentially effect backups, it just depends where you have them.
theFu
If you backup just data, you'll still be impacted. It might be an inconvenience or it might end in having your data AND your backups encrypted. Just depends on how the backups are performed.
Enterprises should be following best practices for backups. Most homes can't do this because they don't have a separate, secured, backup server that can "pull" the backups and keep multiple (60+) versions of both the OS and data. It isn't hard or even THAT expensive to accomplish this, but most people have lives that don't revolve around doing backups correctly.
In an enterprise, being highly impacted by this ransomeware should lead to lots of people being fired. They are incompetent. They should know better than to use network file sharing for backups. That is a noob mistake.
lostrune2
That's why keep your systems up-to-date and backup, backup, backup
The exploit was developed by the U.S. NSA, but it was leaked to the wild by a group only known as "Shadow Brokers"
Microsoft already published the patch back in March, so these computers had couple months time to implement the security
Russia, Ukraine, India, and Taiwan appear to be the most infected countries by far, according to cybersecurity firms Kaspersky and Avast
Albert Rodriguez
Does anybody know if Bitcoin was used to pay off any ramson ?...