{"id":46949,"date":"2018-03-07T13:53:47","date_gmt":"2018-03-07T18:53:47","guid":{"rendered":"http:\/\/www.eagleeyenetworks.com\/?p=46949"},"modified":"2020-08-11T14:03:44","modified_gmt":"2020-08-11T19:03:44","slug":"wannacry-ransomware-update","status":"publish","type":"post","link":"https:\/\/www.een.com\/fr\/blog\/wannacry-ransomware-update\/","title":{"rendered":"WannaCry Ransomware Update"},"content":{"rendered":"<p>The WannaCry ransomware virus recently infected 160 computers in 11 different Connecticut government agencies, according to the state&rsquo;s CIO.<\/p>\n<p>The WannaCry ransomware virus infects computers by scrambling its data before the program displays a screen, which demands you pay money to gain back access to your files. Typically the price increases over time, until the end of a countdown, when the files are destroyed. The hackers are asking for payment in bitcoin, a cyber currency, which makes this ransomware attack unique.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-full wp-image-46950\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2018\/03\/wannacry-ransomware-update.png\" alt=\"wannacry-ransomware-update\" width=\"523\" height=\"392\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2018\/03\/wannacry-ransomware-update.png 523w, https:\/\/www.een.com\/wp-content\/uploads\/2018\/03\/wannacry-ransomware-update-300x225.png 300w, https:\/\/www.een.com\/wp-content\/uploads\/2018\/03\/wannacry-ransomware-update-100x75.png 100w, https:\/\/www.een.com\/wp-content\/uploads\/2018\/03\/wannacry-ransomware-update-173x130.png 173w, https:\/\/www.een.com\/wp-content\/uploads\/2018\/03\/wannacry-ransomware-update-200x150.png 200w, https:\/\/www.een.com\/wp-content\/uploads\/2018\/03\/wannacry-ransomware-update-400x300.png 400w\" sizes=\"(max-width: 523px) 100vw, 523px\" \/><\/p>\n<p>In this WannaCry attack, IT staff were able to contain the malware within a couple of days, and most of the state&rsquo;s government computers were safe thanks to regular patching and antivirus protection. However, this attack resulted in an in-depth review of network logs and detection systems to determine how the ransomware entered the network and spread.<\/p>\n<p>Luckily, in this instance, there are no reports of lost data as a result of this breach in Connecticut, and its system has been restored from backups.<\/p>\n<p>A similar breach last month to the Colorado Department of Transportation in Allentown, PA was not as lucky &#8211; estimates indicate that the effects of this breach will cost Allentown $1 million.<\/p>\n<p>As cyber-attacks continue to morph, it&rsquo;s essential to protect your equipment and maintain that protection. Cameras, DVRs, and other security equipment are all vulnerable. Instead of relying on your internal IT teams to continuously maintain and patch all of these devices, shift the cyber-protection workload to 3rd parties who specialize in cyber security.<\/p>\n<p>Ref:\u00a0<a href=\"https:\/\/gcn.com\/articles\/2018\/02\/26\/connecticut-wannacry.aspx?s=gcntech_270218\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/gcn.com\/articles\/2018\/02\/26\/connecticut-wannacry.aspx?s=gcntech_270218<\/a><\/p>\n<p>Read More Cyber Security Blogs<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The WannaCry ransomware virus recently infected 160 computers in 11 different Connecticut government agencies, according to the state&rsquo;s CIO. The WannaCry ransomware virus infects computers by scrambling its data before &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/fr\/blog\/wannacry-ransomware-update\/\"> <span class=\"screen-reader-text\">WannaCry Ransomware Update<\/span> Lire la suite\u00a0\u00bb<\/a><\/p>\n","protected":false},"author":3155,"featured_media":46958,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[230],"tags":[1273,1276,1272],"class_list":["post-46949","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cloud-video-surveillance","tag-cybersecurity","tag-video-management-software"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/posts\/46949","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/users\/3155"}],"replies":[{"embeddable":true,"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/comments?post=46949"}],"version-history":[{"count":0,"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/posts\/46949\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/media\/46958"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/media?parent=46949"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/categories?post=46949"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/tags?post=46949"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}