1-888-99-JAMKO

Latest Rasomware Outbreak

Latest Rasomware Outbreak

BREAKING! A New #Ransomware Outbreak

Ransomware Outbreak - Virus AttackA new Ransomware Outbreak is adding stress to already battered infrastructures across the globe. Properly provisioned networks will survive.

Here is the latest from McAfee:

McAfee is receiving multiple reports of modified #Petya ransomware outbreak variants. McAfee Labs is receiving various samples which are in analysis, and can confirm that McAfee Global Threat Intelligence (GTI) is protecting against current known samples at the low setting.

Extensions currently known as being affected are: .3ds, .7z, .accdb, .ai, .asp, .aspx, .avhd, .back, .bak, .c, .cfg, .conf, .cpp, .cs, .ctl, .dbf, .disk, .djvu, .doc, .docx, .dwg, .eml, .fdb, .gz, .h, .hdd, .kdbx, .mail, .mdb, .msg, .nrg, .ora, .ost, .ova, .ovf, .pdf, .php, .pmf, .ppt, .pptx, .pst, .pvi, .py, .pyc, .rar, .rtf, .sln, .sql, .tar, .vbox, .vbs, .vcb, .vdi, .vfd, .vmc, .vmdk, .vmsd, .vmx, .vsdx, .vsv, .work, .xls, .xlsx, .xvd, .zip

We have confirmed with the samples that SMB is being used as a propogation method, and are aware of reports that RDP may also be used but have yet to confirm this.

After encryption, impacted systems may show a ransom screen and suggest a system reboot after which the system will not be accessible.

Call JamKo Force Networks 239.249.3306 – Your Malware Defense Professional

Related Post