The country’s cyber security agency has warned against the damaging activities of Wannacry, a potent and globally active ransom virus that infects Internet users critically at workstations and locks them away.
A red “critical alert” was published by India’s Computer Emergency Response Team (CERT-In), a knot agency to combat piracy, use phishing, and strengthen security advocacy in the Indian Internet space.
“A new ransom called Wannacry spreads widely Wannacry encrypts files on infected Windows systems This ransom is spreading by using a security hole in server message block (SMB) applications on Windows systems.
A consultation document issued by CERT-In, accessed by “This abuse is called ETERNALBLUE”.
Said that the ransom software ‘WannaCry’ or ‘WannaCrypt’ encrypts the hard disk drive of the computer, and then spreads laterally between computers on the same local area network (LAN).
“My lisses have spread e-mail through malicious attachments,” he said.
Many hospitals, telecommunications companies, and other companies have computer servers for ransom yesterday, and their country hit a massive tyrant attack.
A cyber thief software is a kind of malware that prevents access to a computer system until you have paid some money over the online environment.
The cyber drug agency has recommended that users apply patches to Windows systems to prevent and spread infections.
Ransomware virus is so deadly and clever, “he said, and” How do I pay the ransom with the text explaining what happened (please, computer) “! Please Read Me! .txt” left a named file. ”
‘WannaCry’ encrypts files using the following extensions that add .WCRY to the end of the file name, such as .lay6, .sqlite3, .sqlitedb, .accdb, .java, and .docx from other extensions.
CERT-In has also proposed some anti-ransomware measures:
Regularly check the integrity of the information stored in the databases, check the contents of the backup files of the databases regularly for unauthorized encrypted content of data records, do not open attachments in unwanted emails, even if they are from people in your audience, and never have a URL in an unsolicited e-mail , But even if the link looks good-natured.
“When it comes to real (universal resource finder) URLs, close the e-mail and go directly to the web site of the organization via the browser,” he said.
The most important advisory document issued by CERT-In states that “the files are not guaranteed to be released because people or organizations are not encouraged to pay ransom.
“Report such fraud incidents to CERT-In and law enforcement agencies,” he said.