2017: the year of ransomware - welivesecurity · the outbreak began in ukraine. attackers used a...
TRANSCRIPT
The outbreak began in Ukraine.Attackers used a compromised
update of the M.E.Doc accountingsoftware to spread the malware.
Infected more than 230.000computers in 150 countries.
Used the Eternal Bluevulnerability in unpatched systems.
Malware is often spread via email or by drive-by downloads from compromised websites or even via software updates. After it encrypts all your precious data,the ransomware generates a pop-up message asking you to pay.
If you are tempted to pay the ransom, keep in mind that there
is NO GUARANTEE your files will be returned to you or that
the malware will be removed
Back up your company data.
Install the latest security updates & patches.
Use a reputable business security software suite.
Immediately turn off the a�ected computer.
Try System Restore.
Set the BIOS clock back.
And – in particular – DON’T PAY.
Protect Your Businessfrom Ransomware
How not to fall victim to #WannaCry or #Petya
2017: The Year of Ransomware
HOW TO PROTECT YOURSELF
IF YOU HAVE SUSPICIONS…
BEFORE YOU GET INFECTED...
PAY $$$
Learn more about the #Petya outbreak onESET.com/int/business/ransomware-attacks/
Recent ransomware outbreaks which have infected hundredsof thousands of computers in more than 150 countries have proven that the year 2017 is the year of locked & lost data. 2017