By Eric Payne - Sr. Security Architect

Social media today is flooded with news about the new ransomware, early reported to be Petya ransomware. This ransomware takes advantage of the same vulnerability as WannaCry – Windows SMBv1 Vulnerability.

According to Threat Post, Kaspersky Labs Security News Service, security experts are still trying to determine what type of ransomware is being distributed. Early theories pointed to Petya while others say the ransomware may be a new strain yet to be identified. Kaspersky Lab malware analyst Vyacheslav Zakorzhevsky said infections were traced to a “new ransomware we haven’t seen before.”

It is amazing to me that this is affecting so many companies since the fix has been around for some time and we had a big scare just a month ago. If you acted after WannaCry, congratulations—you should be protected. For those of you who are not caught up with your Windows patching, we will refer you back to our Blog post from May 15th:

WannaCry Information:

If your next step is to review the WannaCry blog post, my question to you is: Why didn’t you take action and fix this issue?  I explained in the last blog post, we expect to continue to see more and more of these ransomware attacks. This latest ransomware is proof that cybercriminals are counting on your lackadaisical approach to security. If time, resources, or knowledge is an issue, it is time to consult with a security provider who can help you get the job done. The SRC engineering team is ready to help. Contact us today to learn more about how we can help you with your Windows patching and endpoint security needs.

You can learn more about this ransomware here: