No More Tears: A Few Recommended Steps In Response To WannaCry Ransomware

B
BakerHostetler

Contributor

BakerHostetler logo
Recognized as one of the top firms for client service, BakerHostetler is a leading national law firm that helps clients around the world address their most complex and critical business and regulatory issues. With five core national practice groups — Business, Labor and Employment, Intellectual Property, Litigation, and Tax — the firm has more than 970 lawyers located in 14 offices coast to coast. BakerHostetler is widely regarded as having one of the country’s top 10 tax practices, a nationally recognized litigation practice, an award-winning data privacy practice and an industry-leading business practice. The firm is also recognized internationally for its groundbreaking work recovering more than $13 billion in the Madoff Recovery Initiative, representing the SIPA Trustee for the liquidation of Bernard L. Madoff Investment Securities LLC. Visit bakerlaw.com
On May 12, 2017, thousands of companies across the globe saw the first signs of a prolific malware outbreak.
United States Technology
To print this article, all you need is to be registered or login on Mondaq.com.

On May 12, 2017, thousands of companies across the globe saw the first signs of a prolific malware outbreak. The malware, a ransomware variant labeled WannaCry, is capable of encrypting files on a device and moving laterally to encrypt files on associated file shares. On average, the ransom amount that is demanded is the equivalent of $300 in Bitcoin. Early reports indicate the ransomware, which may function in 27 different languages and encrypted data on over 75,000 systems in 99 countries. Russia, Ukraine, India and Taiwan appear to have been the hardest hit. The attack resulted in some hospitals canceling operations and appointments because critical patient data could not be accessed.

The WannaCry ransomware gained entry into computer systems by exploiting a vulnerability in certain versions of Microsoft Windows. Microsoft released a patch for the vulnerability in March 2017. Microsoft also released a blog that guides individuals and businesses through the steps they should take to stay protected from WannaCry. One reason this ransomware has been so prolific is that it is less susceptible to antivrus programs because it is injected into a running process instead of being written to disk.

Two key lessons to be learned from this incident are as follows:

Our incident response team is ready to handle any issues your company may have with this WannaCry ransomware variant or any other data security incidents. Please click here for more information or call our incident response hotline at 855.217.5204 for immediate help.

For more ways to protect yourself from ransomware and other data security incidents, please read BakerHostetler's 2017 Data Security Incident Response Report.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More