WannaCry Ransomware

Summary

Systems Affected: Microsoft Windows operating systems

CVE-2017-0144

Initial reports indicate the hacker or hacking group behind the WannaCry campaign is gaining access to enterprise servers either through Remote Desktop Protocol (RDP) compromise or through the exploitation of a critical Windows SMB vulnerability. Microsoft released a security update for the MS17-010 (https://technet.microsoft.com/en-us/library/security/ms17-010.aspx) vulnerability on March 14, 2017. Additionally, Microsoft released patches for Windows XP, Windows 8, and Windows Server 2003 (http://www.catalog.update.microsoft.com/Search.aspx?q=KB4012598) operating systems on May 13, 2017. According to open sources, one possible infection vector is via phishing emails.

 

Unaffected Quantum Products

The following Quantum products are known to be unaffected by the WannaCry vulnerability.

 

Vulnerable Quantum Products

Versions of the following Quantum products are known to be vulnerable to WannaCry.

 

Impact

Ransomware not only targets home users; businesses can also become infected with ransomware, leading to negative consequences, including:

 

Paying the ransom does not guarantee the encrypted files will be released; it only guarantees that the malicious actors receive the victim’s money, and in some cases, their banking information. In addition, decrypting files does not mean the malware infection itself has been removed.

 

Solution

References

Contact Information

In US, call 800-284-5101. In Europe, call toll free +800-7826-8888 or direct +49 6131 324 185. You will need your system serial number. For additional contact information, go to http://www.quantum.com/serviceandsupport/get-help/index.aspx#contact-support