Results 1 to 5 of 5

Thread: IMP : Windows Vulnerability - WannaCry

  1. #1

    IMP : Windows Vulnerability - WannaCry

    What is Ransomware?

    Ransomware is a malicious software that encrypts the files and locks device, such as a computer, tablet or smartphone and then demands a ransom to unlock it. Recently, a dangerous ransomware named 'Wannacry' has been affecting the computers worldwide creating the biggest ransomware attack the world has ever seen. This has affected computers in India also.

    What is WannaCry Ransomware?

    WannaCry ransomware attacks windows based machines. It also goes by the name WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY. It leverages SMB exploit in Windows machines called EternalBlue to attack and inject the malware. All versions of windows before Windows 10 are vulnerable to this attack if not patched for MS-17-010. After a system is affected, it encrypts the files and shows a pop up with a countdown and instructions on how to pay the 300$ in bitcoins to decrypt and get back the original files. If the ransom is not paid in 3 days, the ransom amount increases to 600$ and threatens the user to wipe off all the data. It also installs DOUBLEPULSAR backdoor in the machine.

    How it spreads?

    It uses EternalBlue MS17-010 to propagate. The ransomware spreads by clicking on links and downloading malicious files over internet and email. It is also capable of automatically spreading itself in a network by means of a vulnerability in Windows SMB. It scans the network for specific ports, searches for the vulnerability and then exploits it to inject the malware in the new machine and thus it spreads widely across the network.

    What can you do to prevent infection?

    Microsoft has released a Windows security patch MS17-010 for Windows machines. This needs to be applied immediately and urgently.
    Remove Windows NT4, Windows 2000 and Windows XP-2003 from production environments.
    Block ports 139, 445 and 3389 in firewall.
    Avoid clicking on links or opening attachments or emails from people you don't know or companies you don't do business with.
    SMB is enabled by default on Windows. Disable smb service on the machine by going to Settings > uncheck the settings > OK
    Make sure your software is up-to-date.
    Have a pop-up blocker running on your web browser.
    Regularly backup your files.
    Install a good antivirus and a good anti-ransomware product for better security.

    What are we doing on our Windows shared servers?

    We are already in the phase of applying Windows updates on all our shared hosting Windows servers. However we need to reboot the servers in-order to apply those security patches. We shall announce the schedule for server reboot in this thread.

    What you need to do in case of our Windows dedicated servers?

    You need to patch the Windows dedicated server immediately using the steps mentioned in the link 'PatchingWindowsOnADedicatedServer'. In-addition to this, please block the IP addresses, domains and file names mentioned in this link : https://goo.gl/JsSo0v

    You can also refer to the following links to apply the necessary fix.

    https://technet.microsoft.com/library/security/MS17-010

    https://technet.microsoft.com/en-us/.../ms17-010.aspx

    https://support.microsoft.com/en-in/help/4013389/title


    For dedicated servers, once you have applied necessary changes, you need to reboot the server.

    Please feel free to contact our support desk if you have any questions.
    Last edited by Gatorprathima; 05-15-2017 at 06:01 PM.

  2. #2
    Hello All,

    Here is the Schedule for the Shared Server Reboot:

    Server : mdin-pp-wb2.webhostbox.net
    Time : Monday 15th May 5:00 PM - 5:30 PM IST

    Server : sdin-pp-wb4.webhostbox.net
    Time : Monday 15th May 5:30 PM - 6:00 PM IST

    Server : bhin-pp-wb2.webhostbox.net
    Time : Monday 15th May 5:30 PM - 6:00 PM IST

    Server : bhin-pp-wb3.webhostbox.net
    Time : Monday 15th May 5:30 PM - 6:00 PM IST

    Server : sdin-pp-wb2.webhostbox.net
    Time : Monday 15th May 5:30 PM - 6:00 PM IST

    Server : bhin-pp-wb1.webhostbox.net
    Time : Monday 15th May 6:30 PM - 7:00 PM IST

    Server : sdin-pp-wb1.webhostbox.net
    Time : Monday 15th May 6:30 PM - 7:00 PM IST

    Server : sdin-pp-wb3.webhostbox.net
    Time : Monday 15th May 7:00 PM - 7:30 PM IST

    Server : mdin-pp-wb3.webhostbox.net
    Time : Monday 15th May 8:30 PM - 9:00 PM IST

    Server : mdin-pp-wb1.webhostbox.net
    Time : Monday 15th May 8:30 PM - 9:00 PM IST

    Server : mdin-pp-wb5.webhostbox.net
    Time : Monday 15th May 8:30 PM - 9:00 PM IST

  3. #3
    Hello All,

    Maintenance has been completed for servers mentioned below.

    Server : mdin-pp-wb2.webhostbox.net
    Server : sdin-pp-wb4.webhostbox.net
    Server : bhin-pp-wb2.webhostbox.net
    Server : bhin-pp-wb3.webhostbox.net
    Server : sdin-pp-wb2.webhostbox.net
    Server : bhin-pp-wb1.webhostbox.net
    Server : sdin-pp-wb1.webhostbox.net
    Server : sdin-pp-wb3.webhostbox.net
    Server : mdin-pp-wb3.webhostbox.net
    Server : mdin-pp-wb1.webhostbox.net
    Server : mdin-pp-wb5.webhostbox.net

    Please feel free to contact our support desk if you have any questions.
    Last edited by Gatorswaroop; 05-15-2017 at 11:17 PM.

  4. #4
    Dear Customers,

    All shared servers are rebooted as per the aforementioned schedule. In continuation of our efforts to safeguard our servers from the WannaCry ransomware, we will be patching the following MSSQL servers today as per the schedule provided below :

    Server Name Time
    sdin-pp-mssql1.webhostbox.net Tuesday 16th May 04:00 - 5:00 PM IST
    mdin-pp-mssql1.webhostbox.net Tuesday 16th May 05:00 - 6:00 PM IST
    bhin-pp-mssql1.webhostbox.net Tuesday 16th May 06:00 - 7:00 PM IST
    plesk-mssql1.webhostbox.net Tuesday 16th May 07:00 - 8:00 PM IST
    plesk-mssql2.webhostbox.net Tuesday 16th May 08:00 - 9:00 PM IST
    plesk-mssql3.webhostbox.net Tuesday 16th May 09:00 - 10:00 PM IST
    bh-plesk-mssql1.webhostbox.net Tuesday 16th May 10:00 - 11:00 PM IST
    md-plesk-mssql1.webhostbox.net Tuesday 16th May 10:00 - 11:00 PM IST
    Please note that all websites using the above mentioned servers as their database server will be affected. Feel free to contact our support desk if you have any questions.

    Regards,
    Akson David.

  5. #5
    Hello All,

    We have blocked the port 445 across all our dedicated servers as a precautionary measure against the SMB attack since this port is used by the exploiters for the attack.

    Feel free to contact our support desk if you have any questions
    Sonu Singh
    HostGator India

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •