By www.eleconomista.es ,
- View Original
- December 5th, 2017
The National Cryptologic Center (CCN-CERT) has confirmed a "massive attack ransomware that affects a large number of Spanish organizations" whose level of alert is classified as "very high".
E ste attack has particularly affected Telefónica and have taken a series of protective measures in other companies such as Iberdrola, Gas Natural and BBVA.
The CCN-CERT notes that "massive attack ransomware several organizations affects Windows systems by encrypting all your files and drives network to which are connected, and infecting other Windows systems that are in the same network" .
The vulnerability seems to be originating from a hole in the operating system Microsft, since the company released the vulnerability on March 14 in their newsletter and a few days ago released a proof of concept that seems to have been the trigger for the campaign .
The type of ransomware is a version of WannaCry that "infects the machine by encrypting all your files and, using a vulnerability in remote command execution via SMB, it is distributed to other Windows machines that are in the same network."
Affected systems are: Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7, Windows 8.1, Windows RT 8.1, Windows Server 2012 and R2, Windows 10 and Windows Server 2016.
To be safe, you should upgrade systems to the latest version or patch as reported by the manufacturer on its website.
For systems without support or patch, as Windows 7, it is recommended to isolate the network or off as appropriate.
What does "Very High"?
The CCN-CERT has cataloged the alert level for this cyber threat as "very high" but what does this rating mean?
The "very high" level is the penultimate level as risk warning and means that it is "a major threat affecting the institutions so that immediate action is required. The probability of affecting and damaging information systems is high.
In addition to all the measures outlined in the previous levels, security officials should coordinate efforts with the necessary response teams take extra precautions in their security policies and prepare to execute contingency plans. "
No hay comentarios:
Publicar un comentario
No se admiten comentarios con datos personales como teléfonos, direcciones o publicidad encubierta