Security Update For Biggest Ransomware Attack!

This is to inform you on the recent massive cyber attacks affecting millions of computer systems world-wide through a vulnerability in the SMB/CIFS protocol. Please note that this vulnerability affects (encrypts filesystem to irrecoverable state) servers & desktops too, hence it’s recommended to immediately patch the local desktop systems too, which might lead to unreadable data & data loss.

We’ll be performing updates on all the systems we’ve access to (login details on our file). If you’ve changed the login details of your servers please run Windows updates manually & specifically (http://go.microsoft.com/fwlink/?LinkId=21130) this update.

For customers running Windows Vista, 7, 8.x, 10.x, alternative method for customers running Windows 8.1 or Windows Server 2012 R2 & later disable SMBv1 (See Microsoft Knowledge Base Article 2696547):

To do so for client/desktop operating systems:

Open Control Panel, click Programs, and then click Turn Windows features on or off. In the Windows Features window, clear the SMB1.0/CIFS File Sharing Support checkbox, and then click OK to close the window. Restart the system.

For server operating systems:

Open Server Manager and then click the Manage menu and select Remove Roles and Features. In the Features window, clear the SMB1.0/CIFS File Sharing Support check box, and then click OK to close the window. Restart the system.

We’re taking all possible efforts to mitigate the situation & request you to kindly contact our support team for any assistance required.

Reference :

1) https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/

2) https://technet.microsoft.com/en-us/library/security/ms17-010.aspx

3) https://isc.sans.edu/forums/diary/ETERNALBLUE+Windows+SMBv1+Exploit+Patched/22304/

4) https://isc.sans.edu/forums/diary/Massive+wave+of+ransomware+ongoing/22412/

Note : Do not ignore this email and run patch on your personal computers to mitigate this situation.

Kind regards,

Support Team.

Leave a Reply

Your email address will not be published. Required fields are marked *