What is WannaCry Attack?
enter site WannaCry Attack
In recent days you have been noticing continuously about the name so called WannaCry. As the name it self-signifies it is making the owners of infected computers cry. In order to mitigate the risk of our computer getting infected. Firstly, we should know about the WannaCry Attack.
Till now, it has infected more than 2 lakh computers worldwide most of them infected ones belong to European continent and the attackers have already earned in millions of bucks in the form of BitCoins
WannaCry is a RansomWare attack which enters into users system through email attachments. Once it enters the user’s computer it will encrypt the most or all of the files present in the system. The attackers’ demand Ransome (money) to get back your files safely. In this case, WannaCry attackers are demanding a minimum of 300$ to decrypt your files. If the user doesn’t pay the amount in 3-days the amount to pay doubles, if the user doesn’t pay in 7 days then the files will be permanently deleted.
No-one has found a solution to WannaCry, Many researchers, organizations and security experts are trying hard to solve it. The only way to get back your files is to pay Ransome. Once the Ransome is paid the attacker provides the decryptor file which decrypts the infected files.
WannaCry attackers are transacting amount in the form of BitCoins. Because BitCoins provides no physical Identities of the payees such that the tracing of the attacker becomes more complex.
Follow Below steps to stay safe from WannaCry type of attacks:
- Download and install any of the popular antivirus software that defends RansomeWare attacks.
- Keep updated with the latest security releases from the operating system vendors.
- Don’t open malicious emails from illegitimate senders.
- Keep an eye on the files being downloaded while you browsing the Internet.
- If you are using organization’s laptop. Then, Be sure that you are using it under secured network. Best thing is to use it in organization’s Intranet.
- Browse only when necessary.
Report any incidents of attack without further delay to your organization security department or security officer.