On 12 May 2017 WannaCry began affecting computers worldwide, with evidence pointing
to an initial infection in Asia at 7:44am UTC. The initial infection was likely through an
exposed vulnerable SMB port, rather than email phishing as initially assumed.
The WannaCry virus, which has infected some 300,000 computers, encrypts users
documents, which then become inaccessible, unless a ransom is paid.the payload displays
a message informing the user that files have been encrypted, and demands a payment of
around $300 in bitcoin within three days, or $600 within seven days.
Three hardcoded bitcoin addresses, or "wallets", are used to receive the payments of
victims. As with all such wallets, their transactions and balances are publicly accessible
even though the wallet owners remain unknown.As of 19 May 2017, at 12:00 UTC, a total
of 291 payments totaling $92,879.51 had been transferred.
Organizations that had not installed Microsoft's security update were affected by the
attack.Those still running the older Windows XP were at particularly high risk because no
security patches had been released since April 2014.
SOME KIND OF SOLUTIONS
WannaKey Wannacry in-memory key recovery for WinXP By Aguinet as he says:"This
software allows to recover the prime numbers of the RSA private key that are used by
Wannacry.
If you are lucky (that is the associated memory hasn't been reallocated and erased), these
prime numbers might still be in memory.
That's what this software tries to achieve."
WannaKiwi another solution a program By The three French experts - Benjamin Delphy,
a computer specialist at the Banque de France, Adrien Guinet, computer security expert
and Matthieu Suiche, a hacker this program locates and unlocks the encryption key,but it
works only if blocking by WannaCry is not effective.
As you can see this is kind of good solutions to fix things depend of situations can happen
to your Microsoft environment, but still not perfect.
Links
ConversionConversion EmoticonEmoticon