Update on Computer Security Alert: Ransomware Attack

05/14/17

Contributed by David Weil

We are providing this update regarding the Ransomware Attack that has been in the news and impacting computers around the world. 

As of Sunday evening we know of no computers at Ithaca College impacted by this attack, but that could change as people return to work on Monday.

If you have questions or concerns, please contact the DIIS Service Desk: 607-274-1000. 

Also, given the media attention to this, there may be a wave of fake email messages that may come out over the next few days asking you to do certain things to “protect yourself”.  If you have any doubt about the authenticity of a message please contact our service desk.

WHAT THE MALWARE DOES:

WHAT MACHINES ARE VULNERABLE:

WHAT PROTECTIONS ARE AVAILABLE:

OTHER STEPS WE ARE TAKING:

ADDITIONAL INFORMATION:

Jason Youngers, our Information Security Officer, has provided this additional background:

Wanna Crypt Ransomware Attack Update

As is being reported in the media, about 200,000 computers around the world have been hit by a ransomware attack over the past three days. The majority of them were infected quickly on Friday afternoon. Russia and Europe were badly hit. DIIS has not been made aware of any IC computers becoming infected so far, but due to the timing of the attack users may not be aware of it themselves until Monday morning.

What makes this attack unusual is that no user action is required to get infected---it’s an over-the-network “worm” attack. Once a computer is infected, it reaches out to infect other computers on the same network. Successful large-scale attacks of this type have been relatively rare recently, but this attack takes advantage of a vulnerability in the built in file-share software on certain versions of Windows. Not to be confused with peer-to-peer file-sharing software, like Napster, the vulnerability here is in the built-in Windows software that allows access to file-servers like Mentor.

The attack fell off late Friday afternoon because a malware researcher accidentally triggered a counter-intelligence kill-switch that was hard-coded into the malware. There are currently rumors of a second version of the malware that has no kill switch, so we may see a second wave of infections. We may also see other kinds of attacks besides malware taking advantage of this vulnerability.

0 Comments



https://www.ithaca.edu/intercom/article.php/20170514212432430