Ransomware attack – important information

UPDATE 28/06/2017

Petya ransomware attack

A new ransomware variation called Petya has been released and is currently spreading throughout Europe and the US.

It is important to recognise that Petya uses the same method of infecting machines and replicating itself as WannaCry and that Microsoft have released a patch to prevent this. Unpatched machines are vulnerable to either Wannacry or Petya so it is vital to ensure that each of your Windows computers including servers are fully up to date with the latest Microsoft Security patches.

Please see this FAQ for instructions on how to update your Windows devices – https://faq.scomis.org/kb18827/

Scomis customers who purchase McAfee Anti- Virus are encouraged to ensure that they have version 8.8 of Virus Scan Enterprise installed with the latest service patch which also provides active protection against all known variants of WannaCry. Download the latest version of McAfee from here – https://faq.scomis.org/kb18789/

Please refer to this FAQ which details the recommended settings for McAfee Virus Scan Enterprise – https://faq.scomis.org/kb18830/

For general guidance on protecting your computers against Viruses and Malware please see this FAQ – https://faq.scomis.org/kb10641/

————————————————————————————————–

LAST UPDATE 23/05/2017

As you will be no doubt be aware due to extensive media coverage, on Friday afternoon a cyber-attack took place that affected the NHS and organisations in over 100 countries.

This has far reaching consequences as the ransomware computer virus encrypts files and demands payment for the release of the data.  Our network security has not been compromised by this attack and Scomis remain on alert monitoring for any suspicious activity.  We are not aware of any issues with our supported schools – however, this is not the first such attack on public and private organisations and will not be the last.

Vigilance is key as new threats are likely to emerge, testing anti-virus software, software patches and email security.  We will be publishing further assistance and guidance in due course to help you to understand this threat and how best to protect your establishment against it.

Posted in Bulletin and tagged , , .