The Stedi Company Ltd
The Stedi Company Ltd

Cyber Attack Advice

Here are a few ways to try and stop any Ransomware Attack on Your PC:

 

None of us wants to see the screen above, therefore:

 

1. Install an up to date Operating System.

 

2. Ensure that your Operating System is always fully updated as patches are released.

 

3. Install good Anti Virus and Anti Malware and keep these up to date.

 

4. Make regular manual backups of all important data, documents and photographs.

 

5. Make sure your Firewall is on and working.

 

6. Be very careful about which e-mails you open and be wary of attatchments and links in suspect mails.

 

In our opinion the best way to protect your PC from these attacks is to make regular backups on devices (Flash Drives or External Hard Drives) that are NOT connected to your PC. By keeping your backups disconnected from the PC the Virus / Ransomware cannot spread to the backup device which can then be used to restore your data to your PC once it has been cleaned and after a fresh load of the operating system.

 

At the present time we believe that defences against these types of attack are at best poor and unreliable and for this reason we recommend regular backups to external unconnected devices. Here we take backups of our PC's to an external hard drive on a weekly basis. We have two hard drives that we rotate in case of failure of one of these. One is kept offsite, with the data encrypted. It may appear that this method is time consuming, however, it is the only reliable defence we know of at the present time.

 

Please do not rely on cloud backups as if the cloud files on your PC are infected the changes may be uploaded to your cloud based files on syncronisation.

 

See Here for The UK National Cyber Security Centre Website which contains advice on how to apply the patch to stop the Ransomware MS17-010 and what to do if you can't.

 

Next Attack

 

There may be other global cyber attacks coming soon.  To date, all that is known about this unnamed malware variant is, it uses seven different NSA exploits leaked by ShadowBrokers, and it functions in a two-part series.  The initial part of execution is to simply worm its way into endpoints.  To do so, it will use at least one of the following exploits:

  • EternalSynergy
  • EternalBlue
  • EternalRoman
  • EternalChampion
  • SMBTouch
  • Architouch
  • DoublePulsar

Once the malware has found its way onto a device, it sits idle to avoid detection.  At some point, malicious actions will be taken.  However, the time frame remains unknown. The primary goal at this time is to spread the malware to as many devices as possible; then, when the time is right, execute the malicious activity.

Please also see our NEWS page.

 

If you have any queries or wish to make an appointment, please contact us:

Mobile:  07817 868441

use our contact form

Please select your language below

You have installed an adblocker. This Web App can only be displayed and edited correctly when the adblocker is disabled.
Print Print | Sitemap Recommend this page Recommend this page
© The Stedi Company Ltd 2016