How to protect your device from ransom payment software

Many big companies, power suppliers and governments around the world have been affected by a series of malicious software known as Petya, which locks the infected computer and shows a ransom request on the screen asking for $ 300 through Bitcoin coins to open infected devices, More than 230,000 computers were attacked in more than 150 countries in May.

But the payment system developed by the pirates is largely useless; they used only one address for currency payments, which the e-mail provider actually stopped. Ransom software is believed to be a cover for malicious programs designed to do a lot of damage, especially for the Ukrainian government. Besides making the computer and its data useless, there are also software inside Petya that steal user names and passwords.

Petya software is actually the name of an older version of malware, and when major differences appeared between the two versions the researchers gave the new version the current name GoldenEye.

How to Protect Your PC from Petya Software

There are two ways Petya / GoldenEye attacks computers; it attacks vulnerable Windows SMB services, which are used to share files and printers over local networks. The new version of Petya can also be deployed using a copy of the Microsoft PsExec tool with administrator credentials from the target computer .

These problems have been corrected, but some people have not downloaded the reform program, which has helped spread the software so far. So you should make sure that you have the latest version of the Windows operating system; but if you do not have the latest update, you can download the security update through the following links:

A page from Windows to download all versions of the following link

You need to make sure that your antivirus software is up to date, and most antivirus companies have software fixes that prevent the latest version of Petya software.

You should also take appropriate precautions such as backing up your computer regularly and keeping a recent backup out of the device, and you should open attachments in e-mail messages unless you trust the sender.

 

 

Source
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s