Windows 7 in the crosshairs for the spread of Wannacry Decryptor
Wanna Decryptor has been the protagonist in recent days. Even for those users who don't work on technology news it has been impossible to escape from the information maelstrom caused by this _ransomware_ A computer attack that has made all users Newscasts opened at one time or another with this story: WannaCry was the star.
And as a luxury companion Windows, a platform responsible for spreading the infection, although there is no objection to Microsoft here, since the problem was already patched(but not for computers running Windows XP, Windows Vista, or Windows 7).The human error has been due to the lack of rigor when it comes to keeping the equipment updated by the maintenance managers in each company. An ideal breeding ground for the infection that now has a new actor: Windows 7.
And it is that the now oldest supported operating system of Redmond&39;s (Windows Vista ceased on April 11) is under the spotlight that places it as the most vulnerable system and the one that has caused the most infections, even above Windows XP, which all the news initially pointed to as the incarnation of evil."
A piece of information: more than 97% of the computers that were infected had Windows 7 operating system
A large part of the computers that were infected had Windows 7 operating system, one of the systems that did not receive the vaccine against this type of _ransomware_.A figure detailed in an analysis by the security firm Kaspersky Lab, in which they state that of the 200,000 computers that were infected, 97% used Windows 7. A figure that even exceeds the infections received by computers with Windows XP, a system that despite being without support did not present as many infections.
And within Windows 7 there is also to qualify between the 32-bit version and the 64-bit version, since the latter was the most affected by the attack, doubling the number of infections compared to 32-bit. A fact that is motivated by the fact that the 64-bit version is the most used in companies and large institutions, while the 32-bit version is used more at home.
A _malware_ that spread thanks to the vulnerability that under the name EternalBlue had been stolen by the group The Shadow Brokers from the NSA and that it exploited an SMB vulnerability to install the _ransomware_ package.
An infection that was mostly carried out via spam emails in the form of fake receipts or invoices, job offers , security warnings or notices of undelivered emails, etc. in which the victim opens a ZIP file that is normally attached to said emails, thus activating a malicious JavaScript that causes the _malware_ to be installed so that the cyber attacker activates it when he considers it necessary prompt.
Therefore we return to recapitulate. It is important to keep your computer up to date (whatever platform it is) with the latest patches and completed updates provided by the manufacturer. At the same time it is important to have a backup copy, if not daily, yes weekly, so that in the case of infections or problems the least amount of data is lost material possible when we fix the problem.
"Via | Kaspersky Lab In Xataka | The Shadow Brokers: their story from the NSA hack to the sale of exploits by monthly subscription In Xataka | Wanna Decryptor: this is how the ransomware used in the cyber attack on Telefónica works"