On the 24th October a new strain of ransomware named ‘Bad Rabbit’, which bears similarities to Wannacry and Petya, appeared on the internet. To date, the systems attacked have mostly been confined to Russia and Ukraine.
The ransomware again targets Windows operations systems by exploiting multiple Windows SMB vulnerabilities.
At M247 we have validated that all our systems are protected. This means that we have ensured that all our IT Systems are up-to-date with the latest recommended patches.
Backup and recovery solutions are designed to protect your organization, but sophisticated malware like Locky and Crypto are now targeting your backup data. Make sure you’re doing everything possible to avoid an attack by downloading our free tip sheet “5 Ways Ransomware attacks backup”
Our team have also ensured that the M247 anti-virus definitions also include mitigation from the current threat and all endpoints are up-to-date.
We would like to reassure all our customers that have data residing on the M247 platform that this is fully patched. To help make sure all your systems are safe, please follow our tips below:
- Be careful of any links in your emails that could be harmful – do not click on them if you are unsure.
- Be wary of visiting unsafe of unreliable sites.
- Never click on a link that you do not trust on a web page or access to Facebook or messaging applications.
- Keep your files backed up regularly and periodically.
- Be aware of fraudulent email messages that use similar names to popular services e.g PayePal instead of PayPal.
- If you a receive a message from a friend with a link, ask them to confirm the link is safe before opening.
- Use anti-virus software and always have the latest update.
- Make sure you Windows system has the latest update.
If you have any further questions or would like further information on our MSecure services contact us today