You may be aware of the global WannaCrypt ransomware attack that has featured in the news and has infected millions of systems worldwide, paralyzing many organisations. The vulnerability being exploited is found in the Windows operating system only and as a result Linux servers are not vulnerable. We’ll be performing updates on all the systems we’ve access to (login details on our file). If you’ve changed the login details of your servers please run Windows updates manually & specifically (http://go.microsoft.com/fwlink/?LinkId=21130) this update.
For customers running Windows Vista, 7, 8.x, 10.x, alternative method for customers running Windows 8.1 or Windows Server 2012 R2 & later disable SMBv1 (See Microsoft Knowledge Base Article 2696547). Also for client’s that manage their own server(s) and have Windows OS, we strongly urge you check to make sure you have the latest windows patches installed.
To do so for client/desktop operating systems:
Open Control Panel, click Programs, and then click Turn Windows features on or off. In the Windows Features window, clear the SMB1.0/CIFS File Sharing Support checkbox, and then click OK to close the window. Restart the system.
For server operating systems:
Open Server Manager and then click the Manage menu and select Remove Roles and Features. In the Features window, clear the SMB1.0/CIFS File Sharing Support check box, and then click OK to close the window. Restart the system.
We’re taking all possible efforts to mitigate the situation & request you to kindly contact our support team for any assistance required.
Note : MAKE SURE TO PERFORM PATCH PROCESS AT THE EARLIEST.