Monday, 22 May 2017

How to Prevent WannaCry-Like Ransomware Attacks



The WannaCry ransomware has caused a scare across the world within a few days of being discovered. The biggest ransomware attack yet, WannaCry was temporarily stopped in its tracks by a British researcher by registering an obscure web address, even as it infected 200,000 computers worldwide.

People soon created new WannaCry versions that could not be taken out with the original fix. And the scope of this ransomware is huge. Computers in over 150 countries have been hit, from police departments in India to schools and universities in China, and from Britain’s National Health Service to Telef√≥nica in Spain.

The WannaCry hackers have demanded payments of $200 to $600 (roughly Rs. 13,000 to Rs. 38,000) in bitcoins from organisations as well as individual users whose computers had been infected, or else the data would be wiped.

Even after individual users and IT departments patch and update their systems, there are lingering concerns here. And if you would like to safeguard yourself against such attacks in the future, there’s quite a bit that you can do. Here are some basic things to keep in mind to protect yourself from ransomware attacks.

Never run files you don’t trust
Most computer worms, including WannaCry, spread themselves with the help of unwitting computer users who run a file that they don’t know enough about. These files are sent through emails as attachments, or via obscure URLs masquerading as safe links.

If you receive an email from an unknown source, or an executable file that you don’t trust, never click on it. Discard it into your junk/ spam folder, or delete the file, and empty the recycle bin.

Moreover, Windows OSes since Vista have a security feature called User Account Control, which restricts unauthorised programs, such as the ransomware in question, from full administrative access. If an unknown app brings up a UAC prompt, steer clear of giving it any such permission.

There are ways to safely execute an untrustworthy program, by running them inside a virtual environment. In such a scenario, the program can’t interact with any other files on your computer. Security researchers use this method to study malware but you shouldn’t try it if you don’t know what you’re doing.

Stay away from outdated and pirated OSes
The biggest reason for WannaCry’s success has been the fact that most institutions, corporations and government agencies had been running an unsupported version of Windows, or an outdated one – XP in most cases – owing to a lack of funding for their IT department. Malware like WannaCry rely on exploiting vulnerabilities in your system, and with Microsoft ending support for Windows XP in 2014, thousands of computers were at risk.

The other issue was that there’s a heavy culture of software piracy in countries such as India, China, and Russia, where businesses, and even government offices, were using pirated copies of Windows, which don't always have the required security updates.

There's also the fact that Windows XP is really old (it released in 2001, 16 years ago), and the burden of security lies on the end-user too. As IT departments scramble to fix things around the world, they should implore their companies to either pay Microsoft for extended support contracts, or upgrade from outdated systems to newer versions to avert spread of ransomware such as WannaCry.

For an individual user, it’s obviously much easier. If you’re on an old Windows machine, and haven’t been infected yet, install Microsoft’s emergency patch MS17-010. In the future, stay away from pirated/ unsupported Windows since you won’t receive timely updates, and make sure you’re using a version – Windows 7, 8.1 or 10 – that will get security updates in the long run. If you don’t wish to pay, consider moving to a Linux distro.Source:-NDTV Read More 

0 comments:

Post a Comment