Get Protected against new exploit (Windows only) (May 14, 2017)

Status
Not open for further replies.

RESiSTANT

Server Owner
Joined
February 1st , 2009
Messages
20,872
Reaction score
60,459
Location
Europe
Hello infinitians, I am here to help to you for our computer's security. World was hit by huge hackers attack just 48 hours ago. Hundreds of thousands computers are vulnerable and everything below Windows 10 might be in dangerous. Help protecting your PC manually because current stage of the microsoft windows updates doesn't really help at this moment.

Read More on article: http://indiatoday.intoday.in/story/...04-countries-hit-nsa-criticised/1/953338.html


Also this 0Patch Agent which releases patches / fixes before microsoft: https://0patch.com/

If you notice anything suspicious that happens on your PC run this kaspersky tool: TDS Killer, download free: https://usa.kaspersky.com/downloads/tdsskiller


I personally suggest to all infinitians to disable SMB on windows because the exploit works via SMB protocol (server message box): https://support.microsoft.com/en-gb...r-2008-r2,-windows-8,-and-windows-server-2012

SMB alternative for Win 8.1:

Alternative method for customers running Windows 8.1 or Windows Server 2012 R2 and later
For client operating systems:

  1. Open Control Panel, click Programs, and then click Turn Windows features on or off.
  2. In the Windows Features window, clear the SMB1.0/CIFS File Sharing Support checkbox, and then click OK to close the window.
  3. Restart the system.
For server operating systems:

  1. Open Server Manager and then click the Manage menu and select Remove Roles and Features.
  2. In the Features window, clear the SMB1.0/CIFS File Sharing Support check box, and then click OK to close the window.
  3. Restart the system.
Impact of workaround. The SMBv1 protocol will be disabled on the target system.
How to undo the workaround. Retrace the workaround steps, and select the SMB1.0/CIFS File Sharing Support check box to restore the SMB1.0/CIFS File Sharing Support feature to an active state.

Read more: https://technet.microsoft.com/en-us/library/security/ms17-010.aspx

UPDATE:

Currently ESET antivirus manages to block the virus: www.eset.com
 
Status
Not open for further replies.
Top