{"id":11499,"date":"2017-05-15T10:15:35","date_gmt":"2017-05-15T00:15:35","guid":{"rendered":"https:\/\/macquarietechnologygroup.com\/?p=11499"},"modified":"2024-07-29T14:41:50","modified_gmt":"2024-07-29T04:41:50","slug":"avoid-international-computer-virus-malware","status":"publish","type":"post","link":"https:\/\/macquarietechnologygroup.com\/news\/avoid-international-computer-virus-malware\/","title":{"rendered":"Urgent: On-going International computer virus WannaCry: What to know, what to do."},"content":{"rendered":"
Over the weekend news broke about a global cyber security emergency that has impacted hundreds of thousands of computers around the world. It has caused serious disruption in health care, emergency services and business generally.<\/p>\n
There is a high risk that as people arrive at work in Australia today, we will see the spread of incidents here.
\nBut there are things you and your business can do immediately to protect yourself.<\/p>\n
A piece of malicious code called ransomware has infected computers by taking advantage of a flaw in some versions of Microsoft networking software. This malware enters hidden via emails that carrying infected code (known as Phishing) and then spreads from one computer to another.<\/p>\n
Once in place, the malware locks access to the computers and the files in the network. It demands users pay a ransom before the computers will be unlocked. If they do not, the users\u2019 data will be permanently destroyed.<\/p>\n
You might have read that the spread of the malware was initially contained when a clever IT worker in the UK created a \u201ckill switch\u201d. He did this by registering a domain name that infected computers communicated with before beginning to spread. This stopped the virus acting.<\/p>\n
However, this does not mean the crisis is over.<\/span><\/strong><\/p>\n The fix does not protect all computers in all situations, depending on how your network is configured, and the malware is reportedly \u201cevolving\u201d to get around the immediate fix.<\/p>\n First<\/span><\/strong>, ensure you have patched all your servers and workstations to ensure they are using the latest version of software. Once the malware has entered through an infected email, it spreads from computer to computer through Microsoft networking software.<\/p>\n Microsoft has released patches to close the vulnerability in various versions of its server software Windows operating system, guidance to who is affected, and advice as to immediate action you can take, which can be found here<\/a>. Some organisations install patches on a longer cycle \u2013 say, bimonthly \u2013 and might have missed patches released over the weekend.<\/p>\n Your second<\/span><\/strong> line of defence is to try to prevent the malware getting into your system in the first place. Thirdly<\/span><\/strong>, users should be extra vigilant in opening suspicious email, especially when they log on for the first time after the weekend.<\/p>\n Finally<\/span><\/strong>, ensure that you have effective and up to date back-ups. That way, if all else fails, you can recover your lost data.<\/p>\n If you have been impacted by this malware, you should report it to the National Computer Emergency Response Team (CERT Australia).<\/p>\n info@cert.gov.au<\/a> or the Australian Cyber Security CentreWhat can you do?<\/h3>\n
\nThe malware enters through an infected email. Emails carrying the infection can be stopped at your Internet Gateway (for those who use a Gateway) by ensuring your email filtering and firewall software is up to date with all the latest signatures.<\/p>\nWho can you call?<\/h3>\n
\nHotline: 1300 292 371<\/p>\n
\n1300 292 371
\nACSC<\/a><\/p>\n