A lot of people around the world was infected by the worm WannaCrypt or wannacry that locks your files and demand some ransom (ransomware) with payment via bit coin. To prevent yourself from this attack please make sure that you had updated the windows patch to the latest version.
Details are below.
- In March, we released a security update which addresses the vulnerability that these attacks are exploiting. Those who have Windows Update enabled are protected against attacks on this vulnerability. For those organizations who have not yet applied the security update, we suggest you immediately deploy Microsoft Security Bulletin MS17-010.
- For customers using Windows Defender, we released an update earlier today which detects this threat as Ransom:Win32/WannaCrypt. As an additional “defense-in-depth” measure, keep up-to-date anti-malware software installed on your machines. Customers running anti-malware software from any number of security companies can confirm with their provider, that they are protected.
- This attack type may evolve over time, so any additional defense-in-depth strategies will provide additional protections. (For example, to further protect against SMBv1 attacks, customers should consider blocking legacy protocols on their networks).
If you still run obsolete version of windows like windows XP, you should upgrade to the latest, but for whatever reason you can’t upgrade due to some legacy software that are still running, then you are lucky because Microsoft release security updates for those run out windows as well.
Download localized language security updates: Windows Server 2003 SP2 x64, Windows Server 2003 SP2 x86, Windows XP SP2 x64, Windows XP SP3 x86, Windows XP Embedded SP3 x86, Windows 8 x86, Windows 8 x64
If you require our assistance to help with the path, don’t hesitate to let us know.