https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/
If you affected by the current Ransomware attacks’ then its best to follow this advice and patch your systems before similar attacks are launched.
https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/
If you affected by the current Ransomware attacks’ then its best to follow this advice and patch your systems before similar attacks are launched.
In what feels like perfect timing from Microsoft, it seems they had already released patches for some if not all of the exploits released these past few days by the file dump by the ShadowBrokers.
Code Name | Solution |
“EternalBlue” | Addressed by MS17-010 |
“EmeraldThread” | Addressed by MS10-061 |
“EternalChampion” | Addressed by CVE-2017-0146 & CVE-2017-0147 |
“ErraticGopher” | Addressed prior to the release of Windows Vista |
“EsikmoRoll” | Addressed by MS14-068 |
“EternalRomance” | Addressed by MS17-010 |
“EducatedScholar” | Addressed by MS09-050 |
“EternalSynergy” | Addressed by MS17-010 |
“EclipsedWing” | Addressed by MS08-067 |
This has been taken straight from the Microsoft Blog.
Regardless how this happens does not matter, it is just good to know that most if not all of these issues released are patched.
***On 17th April, we have a news article on the BBC that actually covers this story by Microsoft
http://www.bbc.co.uk/news/technology-39620534
It is good to see that we are getting better as an industry to fix and patch these exploits.