SlideShare a Scribd company logo
TECHNICAL GUIDANCE TO PREVENT WANNACRY
RANSOMWARE ATTACK
1
ALONG WITH THE RISE OF RANSOMWARE ATTACKS AROUND THE WORLD NAMED
WANNACRY OR WANNACRYPT, A NEW VARIANT MALWARE THAT IS BELIEVED TO BE
DEVELOPED USING NSA'S EXPLOIT TOOLS TO ATTACK COMPUTERS WITH MICROSOFT
WINDOWS OPERATING SYSTEM, ISACA ID TRIES TO HELP PROVIDE PREVENTIVE GUIDANCE
TO AVOID THOSE MALWARE ATTACKS.
2
HERE ARE THE STEPS THAT CAN BE DONE TO PREVENT THE INFECTION OF MALWARE
WANNACRY ON YOUR END CLIENT COMPUTERS THAT USE WINDOWS OPERATING
SYSTEM 10:
• 1. Disconnect your machine from the internet both wired or wireless network.
• 2. Backup all of your files from local drive to external storage.
• 3. Update Antivirus definition.
• 4. Install Security Patch MS17-010 - KB3210720
Install MS17-010 Windows Security Patch KB3210720 from the following link:
• 5. Disabling the SMBv1/CIFS File Sharing Support.
• 6. Close ports that related to SMB services: 139, 445, 3389.
• Download all update that needed and save it on a network computer, then ask the
people to get
the updates from the that computer (acting as central repository) in order to prevent
external exposure
3
4
GUIDE TO DOWNLOAD AND INSTALL SECURITY
PATCHES UPDATE MS17-010 - KB3210720
1. DOWNLOAD MS17-010 WINDOWS SECURITY PATCH KB3210720 FROM THE
FOLLOWING LINK:
HTTP://WWW.CATALOG.UPDATE.MICROSOFT.COM/SEARCH.ASPX?Q=KB3210720 :
DOWNLOAD AND SAVE THE UPDATES THAT MATCH YOUR SYSTEM VERSION. FIRST ONE
FOR X86-32 BIT AND THE SECOND ONE FOR X64 – 64 BIT SYSTEM:
5
THE DOWNLOAD PAGE WILL TAKE SOMETIME TO
SHOW UP, THEN SAVE THE UPDATES ONTO YOUR
LOCAL DRIVE.
6
2. INSTALL PATCHES ACCORDING TO YOUR
COMPUTER VERSION.
7
3. PRESS BUTTON FINISH WHEN IT’S DONE.
GUIDE TO UPDATE THE ANTIVIRUS WINDOWS DEFENDER
RUN THE WINDOWS DEFENDER ANTIVIRUS FORM THE RIGHT BOTTOM ICON.
8
2. SELECT UPDATE TAB THEN PRESS UPDATE
DEFINITIONS.
9
3. DONE.
GUIDE TO DISABLE SMBV1/CIFS ON WINDOWS 10:
1. CLICK ON THE WINDOWS START BUTTON AND TYPE “PROGRAMS AND FEATURES”,
THE MENU WILL SHOW UP AS SEEN BY THE PICTURE BELOW:
10
OR YOU CAN ALSO BROWSE FROM THE WINDOWS SETTINGS AS
THE FOLLOWING STEPS:
PRESS WINDOWS ICON ON YOUR LEFT BOTTOM THEN PRESS SETTINGS MENU SYSTEM
Select System menu
11
2 ON THE LEFT SIDE BAR SELECT “APPS &
FEATURES”.
12
SCROLL DOWN THE CENTER WINDOWS AND
CLICK ON THE PROGRAMS AND FEATURES MENU
13
ON THE LEFT BAR MENU OF PROGRAM AND
FEATURES WINDOW, SELECT “TURN WINDOWS
FEATURES ON OR OFF”.
14
3 UNCHECK OPTION FOR SMB 1.0/CIFS FILE
SHARING SUPPORT, THEN PRESS OK BUTTON.
15
4. WHEN IT’S DONE RESTART YOUR SYSTEM BY
PRESSING RESTART NOW BUTTON.
16
5. YOUR SMBV1 SERVICES HAS BEEN DISABLED.
Guide to block specific ports 139, 445 & 3389 using win Firewall on
Windows 10
• 1. Click on the windows start button and type “Firewalls”, the menu will show
up as seen by the picture below:
17
2. THE FIREWALL APPLICATION WILL SHOW UP,
SELECT INBOUND RULES MENU ON THE LEFT SIDE
BAR.
18
3. ON THE TOP MENUS, SELECT ACTION THEN
PRESS NEW RULES MENU.
19
4. NEW INBOUND WINDOW WILL SHOW UP,
SELECT PORT BUTTON THEN PRESS NEXT
20
5. SELECT TCP MENU ON THE TOP AND SPECIFIC
LOCAL PORTS ON THE BOTTOM.
INSERT PORT NUMBER 139, 445, AND 3389 ON THE
TEXT FIELD THEN PRESS NEXT. DO THE SAME THING
FOR THE UDP PROTOCOL.
21
6. ON THE ACTION SECTION, SELECT BLOCK THE
CONNECTION THEN PRESS NEXT BUTTON.
22
7. ON THE PROFILE SECTION, CHECK ALL THE
CONNECTION MODE IF NECESSARY, THEN PRESS
NEXT.
23
8. GIVE ANY NAME TO IDENTIFY YOUR NEW
RULES AND FILL THE DESCRIPTION, THEN PRESS
FINISH. DONE.
24
25

More Related Content

What's hot

Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | SysforeYour Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Sysfore Technologies
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
dinCloud Inc.
 
Take the Ransom Out of Ransomware
Take the Ransom Out of RansomwareTake the Ransom Out of Ransomware
Take the Ransom Out of Ransomware
Unitrends
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
IBM Security
 
Evolution of ransomware
Evolution of ransomwareEvolution of ransomware
Evolution of ransomware
Charles Steve
 
Escan advisory wannacry ransomware
Escan advisory wannacry ransomwareEscan advisory wannacry ransomware
Escan advisory wannacry ransomware
MicroWorld Software Services Pvt Ltd
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
Noushin Ahson
 
Ransomware: Can you protect against attacks?
Ransomware: Can you protect against attacks?Ransomware: Can you protect against attacks?
Ransomware: Can you protect against attacks?
Osirium Limited
 
Zero day exploit
Zero day exploitZero day exploit
Zero day exploit
Aashiq Ahamed N
 
Ransomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationRansomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and Mitigation
Maaz Ahmed Shaikh
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
Mohsin Dahar
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacksIndustry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacks
kevinmass30
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
OPSWAT
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Seven Effective Habits When Using The Internet
Seven Effective Habits When Using The InternetSeven Effective Habits When Using The Internet
Seven Effective Habits When Using The Internet
Helen Dixon
 
How to protect your business from Wannacry Ransomware
How to protect your business from Wannacry RansomwareHow to protect your business from Wannacry Ransomware
How to protect your business from Wannacry Ransomware
Kaspersky
 
5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today
Velocity Network Solutions
 
Best practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresBest practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included features
Alexander Benoit
 
Network security
Network securityNetwork security
Network securityNikhil Vyas
 

What's hot (20)

Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | SysforeYour Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
 
Take the Ransom Out of Ransomware
Take the Ransom Out of RansomwareTake the Ransom Out of Ransomware
Take the Ransom Out of Ransomware
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
Evolution of ransomware
Evolution of ransomwareEvolution of ransomware
Evolution of ransomware
 
Escan advisory wannacry ransomware
Escan advisory wannacry ransomwareEscan advisory wannacry ransomware
Escan advisory wannacry ransomware
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
Ransomware: Can you protect against attacks?
Ransomware: Can you protect against attacks?Ransomware: Can you protect against attacks?
Ransomware: Can you protect against attacks?
 
Zero day exploit
Zero day exploitZero day exploit
Zero day exploit
 
Ransomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationRansomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and Mitigation
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacksIndustry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacks
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Seven Effective Habits When Using The Internet
Seven Effective Habits When Using The InternetSeven Effective Habits When Using The Internet
Seven Effective Habits When Using The Internet
 
How to protect your business from Wannacry Ransomware
How to protect your business from Wannacry RansomwareHow to protect your business from Wannacry Ransomware
How to protect your business from Wannacry Ransomware
 
5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today
 
Best practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresBest practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included features
 
Network security
Network securityNetwork security
Network security
 

Similar to Technical guidance to prevent wanna cry ransomware attack

Cybersafety basics.ppt cs
Cybersafety basics.ppt csCybersafety basics.ppt cs
Cybersafety basics.ppt cs
Vinay Soni
 
Motorola lan planner v13.0 quickstart guide 72 e-157641-01_quickstart-lp
Motorola lan planner v13.0 quickstart guide 72 e-157641-01_quickstart-lpMotorola lan planner v13.0 quickstart guide 72 e-157641-01_quickstart-lp
Motorola lan planner v13.0 quickstart guide 72 e-157641-01_quickstart-lpAdvantec Distribution
 
Ucandas quick operation
Ucandas quick operationUcandas quick operation
Ucandas quick operation
Obdiifr Sales
 
AltiGen Max In Sight Manual
AltiGen Max In Sight  ManualAltiGen Max In Sight  Manual
AltiGen Max In Sight Manual
CTI Communications
 
Windows 10 user guide
Windows 10 user guideWindows 10 user guide
Windows 10 user guide
Abhilash Bhima
 
How to-remove- virus
How to-remove- virusHow to-remove- virus
How to-remove- virus
securesolutionusa
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
Surya Bathulapalli
 
Android
AndroidAndroid
Readme
ReadmeReadme
Readme
inkydinkyoh
 
Installing and using the omni pcx enterprise pc installer v2.26 software
Installing and using the omni pcx enterprise pc installer v2.26 softwareInstalling and using the omni pcx enterprise pc installer v2.26 software
Installing and using the omni pcx enterprise pc installer v2.26 software
Nuno Torres
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
Dsunte Wilson
 
Desktop and Server Security
Desktop and Server SecurityDesktop and Server Security
Desktop and Server Security
Abhinit Kumar Sharma
 
Desktop and server securityse
Desktop and server securityseDesktop and server securityse
Desktop and server securityse
Appin Ara
 
INSTALLING SOFTWARE
INSTALLING SOFTWAREINSTALLING SOFTWARE
INSTALLING SOFTWARE
EchelleOgatis
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
AyushJain628
 
How To: Patch Off-line and Dormant Desktops, Servers and VMs
How To: Patch Off-line and Dormant Desktops, Servers and VMsHow To: Patch Off-line and Dormant Desktops, Servers and VMs
How To: Patch Off-line and Dormant Desktops, Servers and VMsSolarWinds
 
How-To: Patch Off-line and Dormant Desktops, Servers & VMs
How-To: Patch Off-line and Dormant Desktops, Servers & VMsHow-To: Patch Off-line and Dormant Desktops, Servers & VMs
How-To: Patch Off-line and Dormant Desktops, Servers & VMs
SolarWinds
 
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
eugeniadean34240
 

Similar to Technical guidance to prevent wanna cry ransomware attack (20)

Cybersafety basics.ppt cs
Cybersafety basics.ppt csCybersafety basics.ppt cs
Cybersafety basics.ppt cs
 
Motorola lan planner v13.0 quickstart guide 72 e-157641-01_quickstart-lp
Motorola lan planner v13.0 quickstart guide 72 e-157641-01_quickstart-lpMotorola lan planner v13.0 quickstart guide 72 e-157641-01_quickstart-lp
Motorola lan planner v13.0 quickstart guide 72 e-157641-01_quickstart-lp
 
Ucandas quick operation
Ucandas quick operationUcandas quick operation
Ucandas quick operation
 
AltiGen Max In Sight Manual
AltiGen Max In Sight  ManualAltiGen Max In Sight  Manual
AltiGen Max In Sight Manual
 
Windows 10 user guide
Windows 10 user guideWindows 10 user guide
Windows 10 user guide
 
How to-remove- virus
How to-remove- virusHow to-remove- virus
How to-remove- virus
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Android
AndroidAndroid
Android
 
Readme
ReadmeReadme
Readme
 
Readme
ReadmeReadme
Readme
 
Installing and using the omni pcx enterprise pc installer v2.26 software
Installing and using the omni pcx enterprise pc installer v2.26 softwareInstalling and using the omni pcx enterprise pc installer v2.26 software
Installing and using the omni pcx enterprise pc installer v2.26 software
 
10 security enhancements
10 security enhancements10 security enhancements
10 security enhancements
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
 
Desktop and Server Security
Desktop and Server SecurityDesktop and Server Security
Desktop and Server Security
 
Desktop and server securityse
Desktop and server securityseDesktop and server securityse
Desktop and server securityse
 
INSTALLING SOFTWARE
INSTALLING SOFTWAREINSTALLING SOFTWARE
INSTALLING SOFTWARE
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
How To: Patch Off-line and Dormant Desktops, Servers and VMs
How To: Patch Off-line and Dormant Desktops, Servers and VMsHow To: Patch Off-line and Dormant Desktops, Servers and VMs
How To: Patch Off-line and Dormant Desktops, Servers and VMs
 
How-To: Patch Off-line and Dormant Desktops, Servers & VMs
How-To: Patch Off-line and Dormant Desktops, Servers & VMsHow-To: Patch Off-line and Dormant Desktops, Servers & VMs
How-To: Patch Off-line and Dormant Desktops, Servers & VMs
 
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
 

Recently uploaded

GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
Srikant77
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 

Recently uploaded (20)

GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 

Technical guidance to prevent wanna cry ransomware attack

  • 1. TECHNICAL GUIDANCE TO PREVENT WANNACRY RANSOMWARE ATTACK 1
  • 2. ALONG WITH THE RISE OF RANSOMWARE ATTACKS AROUND THE WORLD NAMED WANNACRY OR WANNACRYPT, A NEW VARIANT MALWARE THAT IS BELIEVED TO BE DEVELOPED USING NSA'S EXPLOIT TOOLS TO ATTACK COMPUTERS WITH MICROSOFT WINDOWS OPERATING SYSTEM, ISACA ID TRIES TO HELP PROVIDE PREVENTIVE GUIDANCE TO AVOID THOSE MALWARE ATTACKS. 2
  • 3. HERE ARE THE STEPS THAT CAN BE DONE TO PREVENT THE INFECTION OF MALWARE WANNACRY ON YOUR END CLIENT COMPUTERS THAT USE WINDOWS OPERATING SYSTEM 10: • 1. Disconnect your machine from the internet both wired or wireless network. • 2. Backup all of your files from local drive to external storage. • 3. Update Antivirus definition. • 4. Install Security Patch MS17-010 - KB3210720 Install MS17-010 Windows Security Patch KB3210720 from the following link: • 5. Disabling the SMBv1/CIFS File Sharing Support. • 6. Close ports that related to SMB services: 139, 445, 3389. • Download all update that needed and save it on a network computer, then ask the people to get the updates from the that computer (acting as central repository) in order to prevent external exposure 3
  • 4. 4
  • 5. GUIDE TO DOWNLOAD AND INSTALL SECURITY PATCHES UPDATE MS17-010 - KB3210720 1. DOWNLOAD MS17-010 WINDOWS SECURITY PATCH KB3210720 FROM THE FOLLOWING LINK: HTTP://WWW.CATALOG.UPDATE.MICROSOFT.COM/SEARCH.ASPX?Q=KB3210720 : DOWNLOAD AND SAVE THE UPDATES THAT MATCH YOUR SYSTEM VERSION. FIRST ONE FOR X86-32 BIT AND THE SECOND ONE FOR X64 – 64 BIT SYSTEM: 5
  • 6. THE DOWNLOAD PAGE WILL TAKE SOMETIME TO SHOW UP, THEN SAVE THE UPDATES ONTO YOUR LOCAL DRIVE. 6
  • 7. 2. INSTALL PATCHES ACCORDING TO YOUR COMPUTER VERSION. 7
  • 8. 3. PRESS BUTTON FINISH WHEN IT’S DONE. GUIDE TO UPDATE THE ANTIVIRUS WINDOWS DEFENDER RUN THE WINDOWS DEFENDER ANTIVIRUS FORM THE RIGHT BOTTOM ICON. 8
  • 9. 2. SELECT UPDATE TAB THEN PRESS UPDATE DEFINITIONS. 9
  • 10. 3. DONE. GUIDE TO DISABLE SMBV1/CIFS ON WINDOWS 10: 1. CLICK ON THE WINDOWS START BUTTON AND TYPE “PROGRAMS AND FEATURES”, THE MENU WILL SHOW UP AS SEEN BY THE PICTURE BELOW: 10
  • 11. OR YOU CAN ALSO BROWSE FROM THE WINDOWS SETTINGS AS THE FOLLOWING STEPS: PRESS WINDOWS ICON ON YOUR LEFT BOTTOM THEN PRESS SETTINGS MENU SYSTEM Select System menu 11
  • 12. 2 ON THE LEFT SIDE BAR SELECT “APPS & FEATURES”. 12
  • 13. SCROLL DOWN THE CENTER WINDOWS AND CLICK ON THE PROGRAMS AND FEATURES MENU 13
  • 14. ON THE LEFT BAR MENU OF PROGRAM AND FEATURES WINDOW, SELECT “TURN WINDOWS FEATURES ON OR OFF”. 14
  • 15. 3 UNCHECK OPTION FOR SMB 1.0/CIFS FILE SHARING SUPPORT, THEN PRESS OK BUTTON. 15
  • 16. 4. WHEN IT’S DONE RESTART YOUR SYSTEM BY PRESSING RESTART NOW BUTTON. 16
  • 17. 5. YOUR SMBV1 SERVICES HAS BEEN DISABLED. Guide to block specific ports 139, 445 & 3389 using win Firewall on Windows 10 • 1. Click on the windows start button and type “Firewalls”, the menu will show up as seen by the picture below: 17
  • 18. 2. THE FIREWALL APPLICATION WILL SHOW UP, SELECT INBOUND RULES MENU ON THE LEFT SIDE BAR. 18
  • 19. 3. ON THE TOP MENUS, SELECT ACTION THEN PRESS NEW RULES MENU. 19
  • 20. 4. NEW INBOUND WINDOW WILL SHOW UP, SELECT PORT BUTTON THEN PRESS NEXT 20
  • 21. 5. SELECT TCP MENU ON THE TOP AND SPECIFIC LOCAL PORTS ON THE BOTTOM. INSERT PORT NUMBER 139, 445, AND 3389 ON THE TEXT FIELD THEN PRESS NEXT. DO THE SAME THING FOR THE UDP PROTOCOL. 21
  • 22. 6. ON THE ACTION SECTION, SELECT BLOCK THE CONNECTION THEN PRESS NEXT BUTTON. 22
  • 23. 7. ON THE PROFILE SECTION, CHECK ALL THE CONNECTION MODE IF NECESSARY, THEN PRESS NEXT. 23
  • 24. 8. GIVE ANY NAME TO IDENTIFY YOUR NEW RULES AND FILL THE DESCRIPTION, THEN PRESS FINISH. DONE. 24
  • 25. 25