Ransomware Virus: NCC Warns People About The Dangerous WannaCry Attack

The Nigerian Communications Commission (NCC) in fulfilment of its statutory mandate to assure the security and integrity of the national telecommunications network wishes to alert all operators and their respective subscribers of the recent outbreak of a Ransomware Virus known as “WannaCry”.

The Ransomware is capable of infecting and encrypting all files on a system or any smart device until an amount is paid for a decryption key, or other means of retrieval (which may lead to data loss) are used to recover the system as an alternative. This situation demands that proactive measures be taken by all players in the telecommunication eco-system to forestall the hazards of critical data loss, financial losses and ultimately network/business disruption.

The NCC therefore wishes to advise that the following protective measures be taken, amongst others:

✔ To obtain software patch released by Microsoft in March 2017 to fix the Ransomware Virus.

✔️ To plan scheduled penetration tests on the networks and systems to ensure protection and availability at all times.

✔ Subscribers who use their smartphones as substitutes to computers for internet access should protect themselves and their devices by:

✔️ Not opening e-mail attachments/links from unknown sources.

✔ Not clicking pop-ups and applets on unknown websites.

✔ Installing effective antivirus software for their mobile devices.

Furthermore, the NCC has taken the following proactive measures in fulfilling its statutory mandate;

The Commission has advised Mobile Network Operators (MNOs) to initiate regular assessment and audit of their cybersecurity readiness. All operators should continue to ensure that their backup/ disaster recovery strategies are in place and up to date.

✔ The Commission has further advised all operators to ensure continued deployment of effective firewalls, login passwords and antivirus management regime.

SEE ALSO... Best Antivirus Apps For Android and Tablets

✔ The Commission is working towards creating a link with the Cybersecurity Alert System on its website so that current information on global cyber threats/incidents could be immediately communicated to stakeholders.

✔ The Commission will continue to provide more cybersecurity training for its staff.

Beware!!!

10 comments:

  1. This is a timely update because it was yesterday (15*05*2017) that i decided to read some stuffs about this said attack.

    I'm gonna do as instructed

    ReplyDelete
  2. a good and timely info Thank you

    ReplyDelete

  3. WikiLeaks releases CIA spyware, known as Athena, that targets all Windows versions from XP to 10
    JACK WILKINSON EMAIL @THEJACKAH 1 DAY AGO IN LATEST NEWS

    WikiLeaks has published details of a new piece of spyware created by the CIA. Named Athena, the spyware is able to target all Windows versions from Windows XP to Windows 10. With this piece of spyware, it can hijack an entire PC, allowing the perpetrator to steal data and send it elsewhere, such as CIAs servers, as well as delete data and perform additional infections of a PC by installing more malicious software.

    What's happening with WINDOWS?

    ReplyDelete
  4. WannaCry decryption tool has been released!

    ReplyDelete
  5. The WannaCry ransomware has infected thousands of computer systems around the world, but Adrien Guinet a security researcher of Quarkslab, has found a way to recover the unknown encryption keys used by the ransomware.

    Adrien said that in order to retrieve the keys, your computer must not have been rebooted after being infected. The tool allows recovering the prime numbers of the RSA private key that are used by Wannacry.

    ReplyDelete
  6. Hackers Behind WannaCry Attack Are Sending This Message To Victims!

    “I have already sent decryption keys to many customers who had sent me the correct amounts of bitcoin, and I guarantee the decryptions for such honest customers. Send me a message with your unique bitcoin wallet address an hour before your payment. Then you will receive the decryption key more quickly.”

    ReplyDelete
  7. Not much is said about this malware any longer

    ReplyDelete
  8. Not much is said about this malware any longer

    ReplyDelete