2017: the year of ransomware - welivesecurity · the outbreak began in ukraine. attackers used a...

1
The outbreak began in Ukraine. Attackers used a compromised update of the M.E.Doc accounting software to spread the malware. Infected more than 230.000 computers in 150 countries. Used the Eternal Blue vulnerability in unpatched systems. Malware is often spread via email or by drive-by downloads from compromised websites or even via software updates. After it encrypts all your precious data, the ransomware generates a pop-up message asking you to pay. If you are tempted to pay the ransom, keep in mind that there is NO GUARANTEE your files will be returned to you or that the malware will be removed Back up your company data. Install the latest security updates & patches. Use a reputable business security software suite. Immediately turn off the affected computer. Try System Restore. Set the BIOS clock back. And – in particular – DON’T PAY. Protect Your Business from Ransomware How not to fall victim to #WannaCry or #Petya 2017: The Year of Ransomware HOW TO PROTECT YOURSELF IF YOU HAVE SUSPICIONS… BEFORE YOU GET INFECTED... PAY $$$ Learn more about the #Petya outbreak on ESET.com/int/business/ransomware-attacks/ Recent ransomware outbreaks which have infected hundreds of thousands of computers in more than 150 countries have proven that the year 2017 is the year of locked & lost data. 2017

Upload: others

Post on 17-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 2017: The Year of Ransomware - WeLiveSecurity · The outbreak began in Ukraine. Attackers used a compromised update of the M.E.Doc accounting software to spread the malware. Infected

The outbreak began in Ukraine.Attackers used a compromised

update of the M.E.Doc accountingsoftware to spread the malware.

Infected more than 230.000computers in 150 countries.

Used the Eternal Bluevulnerability in unpatched systems.

Malware is often spread via email or by drive-by downloads from compromised websites or even via software updates. After it encrypts all your precious data,the ransomware generates a pop-up message asking you to pay.

If you are tempted to pay the ransom, keep in mind that there

is NO GUARANTEE your files will be returned to you or that

the malware will be removed

Back up your company data.

Install the latest security updates & patches.

Use a reputable business security software suite.

Immediately turn off the a�ected computer.

Try System Restore.

Set the BIOS clock back.

And – in particular – DON’T PAY.

Protect Your Businessfrom Ransomware

How not to fall victim to #WannaCry or #Petya

2017: The Year of Ransomware

HOW TO PROTECT YOURSELF

IF YOU HAVE SUSPICIONS…

BEFORE YOU GET INFECTED...

PAY $$$

Learn more about the #Petya outbreak onESET.com/int/business/ransomware-attacks/

Recent ransomware outbreaks which have infected hundredsof thousands of computers in more than 150 countries have proven that the year 2017 is the year of locked & lost data. 2017