https://www.reddit.com/r/netsec/comments/6atfkl/wanacrypt0r_ransomware_hits_it_big_just_before/
https://www.reddit.com/r/worldnews/comments/6atevg/massive_ransomware_attack_hits_74_countries/
https://www.reddit.com/r/worldnews/comments/6arkxt/hospitals_across_england_hit_by_largescale/
https://www.reddit.com/r/worldnews/comments/6avf43/accidental_hero_finds_kill_switch_to_stop_spread/
this malware is based on the leaked NSA exploits, and antivirus doesn't protect you. it is a nasty combination trojan, worm, and ransomware. it appears to be spread through spear-phishing emails with infection links embedded, with it able to spread without user interaction on the connected networks after initial pwnage of that person. there are about 8 variants identified so far.
all versions of windows are affected. non-enterprise XP versions do not have a patch for this and are vulnerable.
most people are saying that this malware can be mostly prevented by blocking the initial attack vector( a NSA compromised windows OS component) via applying windows security updates from march 2017 or later. that is unless you're clicking on the download links in the targeted emaila and directly getting the executable payload dropped on your system.
if you have not updated your systems for whatever reason, [b]now[/b] is the time to do so.
remember not to click any funny looking links, even if they appear to be from a legitimate person.
edit: major news sites like the New York Times are posting about this with less technical details but they're behind paywalls.
-
[quote]Microsoft[/quote] Makes sense.
-
it'd be interesting to get Recon Number 54's take on this as he was hospital IT support for Dell.