WannaCry Ransomware, the cyber-attack that choked tens of thousands of computers across the world and of companies and institutions with systems that looked seemingly impregnable, has shaken businesses globally. The fact that the malware was launched using high security tools that were in safe custody of the United States NSA makes the matter worse.
WannaCry Ransomware is a virus that holds computers hostage by blocking critical enterprise data until the demands of the hackers are met. The WannaCry Ransomware affected computers that were running on Microsoft OS. After encrypting all the data, the hackers left messages demanding users to pay $300 in Bitcoin which is a type of cyber-currency that’s extremely popular and commonly used online. This type of payment is easy to make and hard to trace. The hackers threatened that if the ransom was not paid within the stipulated time, the payment demand would double to $600. They warned that non-payment could result in all data and files being completely destroyed.
It is not as if the WannaCry Ransomware made its appearance all of a sudden. Microsoft, in fact, did discover the existence of such a malware sometime early March and also released a security update to patch the vulnerable spots. Those who did not install the security patch were the ones that were affected according to cyber security experts.
Attacks from malware like WannaCry Ransomware can be prevented if users take proper precautions. Those using Windows OS must make sure that their software is updated. Suspicious mails and attachments from unknown sources must never be clicked on. Always backup all your critical data offsite and ensure you have copies of all files that you use regularly. If this is done, all you have to do if your site is hacked and files encrypted is to restore data from the backups after wiping clean your machine.
See more at: WannaCry Ransomware Is Not the First Instance of NSA Stolen Tools
Please fill in the form below and we will contact you within 24 hours.