Cyber Attack Warning From NCC - WannaCry Ransomware

A month after the WannaCry ransomware attack paralyzed connected systems worldwide, a new ransomware ‘Petya’ is spreading around the globe speedily.
Like WannaCry, ‘Petya’ ransomware takes over computers and demands $300, paid in Bitcoin. The malicious software spreads rapidly across an organization once a computer is infected using the EternalBlue vulnerability in Microsoft Windows (Microsoft has released a patch, but not everyone would have installed it) or through two Windows administrative tools. The malware tries one option and if it doesn’t work, it tries the next one. “It has a better mechanism for spreading itself than WannaCry”.
Petya uses three mechanisms to spread to additional hosts.
Petya scans the local system 24/7 to discover enumerate ADMINS shares on other systems, then copies itself to those hosts and executes the malware using PSEXEC. This is only possible if the infected user has the rights to write files and execute them on system hosting the share.
Petya uses the Windows Management Instrumentation Command-line (WMIC) tool to connect to hosts on the local subnet and attempts to execute itself remotely on those hosts. It can use Mimikatz to extract credentials from the infected system and use them to execute itself on the targeted host.
Petya finally attempts to use the ETERNALBLUE exploit tool against hosts on the local subnet. This will only be successful if the targeted host does not have the MS17-010 patches deployed.
How To Avoid Wannacry Ransomware
The general public is advised not to panic as demonstrated during the WannaCry attacks in May, 2017. Windows systems should be patched for this vulnerability by competent personnel. Organisations should take necessary precautions because the spread of Petya using this vulnerability indicates that many organizations may still be vulnerable, despite the attention WannaCry received.
Importantly, please note and observe the following:
*Do not click on any suspicious or unknown links.
*Protect yourself when using public Wi-Fi.
*Do not visit unsafe and unreliable sites.
*Avoid clicking on links that leads to websites such as Facebook, Instagram, WhatsApp etc. Instead it is much safer to visit the site directly through their URL.
*If you receive a message or email with an attachment, try to verify authenticity of the sender before opening.
*Do not open attachments from suspicious senders.
*Store all your documents in ‘my document folder’.
*Keep your files backed up regularly.



android 9.0,1,androidbattle,4,asphalt 8,1,auto,1,blackberry,1,coolpadcool,1,FIFA2018,3,gameweek,7,GEIO BATTLE BOT,1,gionee,9,HTC,6,huawei,21,Infinix,11,iphone,3,itel,2,leaks,106,LG,1,micromax,2,motorola,9,news,321,nokia,8,oppo,7,pes2017,1,PES2018,2,pixelphone,2,pixels,1,razer,1,review,13,samsung,16,sony,2,specifications,180,startup,13,Tecno,19,tips,108,vivo,5,vodafone,1,xiaomi,3,
TechDemi: Cyber Attack Warning From NCC - WannaCry Ransomware
Cyber Attack Warning From NCC - WannaCry Ransomware
wannacry ransomware
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy