logo

Let’s Work Together

Partner with you to deliver responsive and cost-effective IT & Support solutions
Reponsive
Cost-Effective
Partner with you
Focus
Attitude to Serve
Professional
These are the reasons why AionSolution is your vendor when you are seeking someone to support your IT in your office.
info@aionsolution.com
+852 2636 6177

What to do with Ransomware – WannaCry

By now it would be a surprise if you haven’t seen the latest high-profile cyber-attack been reported on over the past weekend. As part of what looks like an unprecedented international wave of cyber-attacks.

What is ransomware?

Ransomware is a type of malicious software that blocks access to a computer or its data and demands money to release it. The worm used in Friday’s attack, dubbed WannaCry or WanaCrypt0r, encrypted more than 200,000 computers in more than 150 countries.  Cybersecurity experts have warned businesses against meeting hackers demands for money.

What to do next?

Here at AionSolution, we have contacted all our customers regardless of the level of infrastructure support package we offer to their business. Our team of experts has been offering guidance and advice to ensure our customers’ systems are up to date and not vulnerable to the WannaCry ransomware.

Ultimately, all businesses and employees need to be more vigilant than ever. Cyber criminals can distribute infected files through a variety of channels, including emails from what looks like a trusted source and illicit links made to look genuine.

If you or any of your staff and colleagues have any doubts then do not open emails, links or download attachments. Employees must be educated on the security risks out there and how to spot them.

How did it spread?

Unlike many other malicious programs, this one can move around a network by itself. Most others rely on humans to spread by tricking them into clicking on an attachment harbouring the attack code.

Once WannaCry is inside an organisation, it will hunt down vulnerable machines and infect them too. This perhaps explains why its impact is so public – because large numbers of machines at each victim organisation are being compromised.

What do you need to do?

If you have not done Windows update since April, here is the action you would like to take

1. For Windows 10 users, update your Windows
2. For Win 7 32 bits / 64 Bits click the link below and install the patch

Windows 7 64
http://download.windowsupdate.com/c/msdownload/update/software/secu/2017/05/windows6.1-kb4019264-x64_c2d1cef74d6cb2278e3b2234c124b207d0d0540f.msu
Windows 7 32
http://download.windowsupdate.com/c/msdownload/update/software/secu/2017/05/windows6.1-kb4019264-x86_aaf785b1697982cfdbe4a39c1aabd727d510c6a7.msu

 

To find out if your computer is running a 32-bit or 64-bit version of Windows in Windows 7 or Windows Vista, do the following:

  1. Open System by clicking the Start button, right-clicking Computer, and then clicking Properties.
  2. Under System, you can view the system type.

Something we would like you to continue to do so —
If you have are doubt about some suspicious emails with links/attachments, do not open the attachment or click the link, report it.

For your information, here is the affected countries and incidents for the last 24 hours.
Talk to us to see how we can help you

https://intel.malwaretech.com/botnet/wcrypt/?t=24h&bid=all