Posts

Wanna.Cry. Why Was This Cyber Attack So Damaging?

wannacry-seccom-global

Around 15 April, 2017 a group known as the Shadow Brokers released a trove of exploits that were allegedly stolen from the US NSA FuzzBunch toolkit. One of these exploits, codenamed EternalBlue, takes advantage of a vulnerability in Microsoft’s Server Message Block (SMB) protocol. EternalBlue provides local privilege escalation via remote code-execution, thereby allowing malware or an attacker to gain control of unpatched systems without user interaction. This vulnerability was patched by Microsoft on March 14, 2017.

On 12 May, 2017 computers around the world began to be infected by the WannaCrypt ransomware. It has been reported that up to 70,000 systems within Britain’s NHS were subsequently infected. The initial infection is thought to have been via a spear phishing attack and reporting suggests that the attack has not been political in nature. WannaCry began rapidly spreading by automatically infecting network-connected PCs using worm-like behaviour.

If you are uncertain that you are suitably prepared for a threat such as WannaCrypt, call Seccom Global on +61 2 9688 6933.

Find out more in our latest whitepaper.

Death of a Domain

Death of a Domain

 

Your website is the lifeblood of your business, especially if you run an ecommerce site. But what happens to your business when your website is hijacked?

Read this whitepaper to discover how one business inadvertantly lost complete access to their website after partnering with an untested supplier.

Read Whitepaper

Securing the Public Cloud

Securing the Public Cloud

Cyber-attacks upon Australian businesses have been increasing exponentially, due in part to the quick uptake of mobility and cloud computing. This White Paper highlights several solutions to address this growing problem.

Download the White Paper to discover how you can protect your organisation’s cloud data.

 

Read Whitepaper