Skip to main content

Security researchers just traced Uiwix, a ransomware which is very similar to WannaCry but more dangerous than it

Now-a-days, the word "WannaCry" is very familiar to all of us. This ransomware exploited the vulnerabilities in  Microsoft’s Windows operating system (except Windows 10) to hack more than 75,000 computers in more than 150 countries & counting last Friday. Microsoft has recently released the security patches for all versions of Winows including XP to prevent this ransomware. Also numerous security researchers are continuously working to develop a permanent solution. Although a temporary solution called "WannaCry KillSwitch" is already discovered by a british security researcher Marcus Hutchins. He slows down the spreads of WannaCry by registering a domain name "wannacry".
Heimdal Security, a cyber security software company has recently reported that another ransomware called Uiwix, has emerged, which is exploiting the vulnerabilities found in Windows SMB v1 and SMB v2. Wannacry is doing in the same method to spread.

Is Uiwix similar to WannaCry?

A group of security researchers has claimed that they have traced WannaCry in Uiwix. Yet, this does not mean that Uiwix & WannaCry are identical. Unfortunately, unlike WannaCry, Uiwix cannot be stopped from spreading just by registering a domain, the Killswitch of Wannacry. Hence, it's called Uiwix is far far more dangerous than WannaCry. Although even some temporary solutions for Wannacry exists, but, still there is no solution discovered for Uiwix.

How does Uiwix work ?

 Uiwix works just like WannaCry. At first it attacks victim's PC, and encrypts important files on it. Then it demands a ransom $200 to get decrypt all the files seized by it. The ransom payment of $218 is demanded in bitcoins with the current exchange rate.

It is very astonishing to have two similar ransomware exploiting the same vulnerability to show up twice so rapidly. So, that it is said that vulnerabilities in Windows software have not been 100% fixed yet.

How to keep safe yourself from Uiwix ?

 Since Uiwix cannot be stopped like  WannaCry, the only way to contain the virus is to fix the vulnerability  that appears to be present in Windows. According to Andra Zaharia, Heimdal Security (a cyber security software company)  :
Attackers are easily able to exploit  these vulnerabilities in a network if it’s enabled because, even when  the system uses SMB v2 or v3, if the attacker can downgrade the  communication to SMB v1, he can exploit the system. This is where the  man-in-the-middle attack of a Windows SMB v1-enabled system can become  an issue, even if it’s not being used "
 However, Uiwix cannot be stopped as of now, the  only way to protect yourself is to take some preventive precautions to  avoid any trouble in the future.  Following these rules strictly may decrease the chances of hijacking by Uiwix -
1. Do not connect your pc, laptop, tablet etc. to a public WiFi hot spot.
2. Do not open any attachments in email from unknown or, suspicious senders.
3. Do not click any links in emails from unknown senders.
4. Do not download any files attached in email from unknown or, suspicious senders.
5. Try to avoid visiting malicious sites.
6. Do not download or, update software/apps from a third-party website, or store.
7. Do not use any out-dated or, pirated software.
8. Install WOT (web of trust) extension, and visit only reputed websites shows by WOT.
9. Keep your antivirus & windows up to date always.
10. You may use Kaspersky anti-ransomware tool, or, Bitdefender anti-ransomware tool for extra security.
11. Disable SMB v1, SMB v2, SMB v3 on windows via registry editing. How to disable it ? Read below.
12. Periodically set restore point. After attack you may able to use System Restore to get back to a known-clean state.
13. Most Important : Always keep offline backup your data, or, do cloud backups. 

How to disable SMB v1, SMB v2, SMB v3 on windows via registry editing ? 

To enable or disable SMBv1 on the SMB server, configure the following registry key:
Registry subkey: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters
Registry entry: SMB1
REG_DWORD: 0 = Disabled
REG_DWORD: 1 = Enabled
Default: 1 = Enabled
To enable or disable SMBv2 on the SMB server, configure the following registry key:
Registry subkey:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\ParametersRegistry entry: SMB2
REG_DWORD: 0 = Disabled
REG_DWORD: 1 = Enabled
Default: 1 = Enabled

references :


Tags : Security, Hacks, Ransomware, Malware, Windows, Microsoft, Operating System,

This Post Was Published On My Steemit Blog. Please, navigate to steemit and cast a free upvote to help me if you like my post. First Time heard about Steemit ? Click Here To Know Everything About Steemit 







Comments

Popular Posts (Last 7 Days)

Diwali - Festival of Lights & Kali Puja - Worship of Power against evils [2017] Episode 02

Diwali & Kali Puja is our another awesome celebration. Diwali is the festival of lights and Kali Puja is the worship of goddess Maa Kali. We celebrate this two festivals in the same night. We, Bengalee also call Diwali as Deepawali. Diwali is celebrated every month of October/November (Autumn) in India, Nepal & Bangladesh. In this day every Hindu decorates their home & temples with lights. Kali Puja is also known as Shyama Puja. In the same night of Diwali we celebrate it. The goddess Kali is the symbol of power against evil. In nowadays our city Kolkata wears glamorous attire & illumination.  I framed some moments on my camera— (all photographs are original & taken by myself)      A decorated shelf with toys An oil painting represents rural life of Bengal Motherly affection Showing respects to old persons Idol of Maa Kali [To be continued ...] Previous Episodes :  Episode #1 Tags : Art, Diwali, Festival, Kali Puja, Photogra

Top 10 famous Abstract Art of all the time

Top 10 famous Abstract Art of all the time I love abstract arts. I believe that abstract art is not what you see , it’s what you think. Abstract art is the freedom of using colors, is the freedom of representing your thoughts in colors. Today, here I share top 10 famous abstract arts of all the time. Hope you’ll enjoy them. Number 10 : The Son Of Man by Rene Magritte image source & credit :  LINK Artist: René Magritte Media: Oil paint Created: 1964 Period: Surrealism Subject: René Magritte Number 09 : Garçon à la pipe by Pablo Picasso image source & credit :  LINK Artist: Pablo Picasso Dimensions: 1 m x 81 cm Created: 1905 Media: Oil paint Period: Picasso’s Rose Period Support: Canvas Number 08 : The Night Watch by Rembrandt image source & credit :  LINK Artist: Rembrandt Dimensions: 3.63 m x 4.37 m Created: 1642 Locations: Amsterdam Museum, Rijksmuseum Periods: Baroque, Dutch Golden Age Genres: Portrait, History pain

A strong password generator program with source code

In my previous post  https://steemit.com/programming/@royalmacro/a-free-open-source-data-encryption-program-for-steemit-users  I share a data encrypton tool with source code, now, today here I share another program, a strong password generator with source code. This program will generate strong, hard-to-guess passwords. I’ll do it by hashing together “domain name”, “login/user id” & “a secure master key”. If you use the same secure master key for every password generations then you do not need to write down or, memorize your generated passwords. When you need your password then repeat the same procedure to re-generate it. If your “domain name”, “login/user id” & “a secure master key” are not different then you will generate the same password. If you use only one secure master key then you have to only memorize your master key, not the passwords. Lets try it ! Step by Step Development : Open a new project in Visual Basic 8. Select “Standard EXE”. Create

One Black & White Photograph Daily for 30 days - Day #25

green yard - behind of my village home Camera : Xiaomi Model : 2014818 Location : Bongaon, West Bengal, India Snap Taken : 14 March 2016 Tags : Black & White Photography, Flowers & Plants photography, Landscape photography, Nature, Photography,  This Post Was Published On My Steemit Blog . Please, navigate to steemit and cast a free upvote to help me if you like my post. First Time heard about Steemit ? Click Here To Know Everything About Steemit  $3 Donation [Fixed] Donate $Any Amount

Unknown Fruit - [Beauty of Nature Series -02]

A snapshot of an unknown fruit (it's not berry) Tags :   Fruits, Nature, Photography, Fruits photography This Post Was Published On My Steemit Blog .  Earned : $00.00 SBD Converted to USD @0.9319$ Rate = $00.00 USD .  First Time heard about Steemit ? Click Here To Know...

“Tears on Cheek of Africa” My Original Abstract Art

My Original Abstract Art “Tears on Cheek of Africa” The love with lands surrounded by the Mediterranean sea to north, Sinai Peninsula keeps a house with whom? Suez and red having room. Forest and her ancient folk always in our feelings and talk, All the mankind having so curious You,more I think mysterious. Beauty of her smile peeking, a truth I know the truth, the truth. The photographer committing suicide never conceding the painful sight. A monster throwing away foods In the water, children of you Crying crying for a grain. The moribund acting his last sequence Why? a vulture waiting, a question. I love you, consider mother of lions Smile revealing a secret, oh Africa! enjoy :) Tags : Abstract, Art, Drawing, Painting, Poems, Poetry,  This Post Was Published On My Steemit Blog . Please, navigate to steemit and cast a free upvote to help me if you like my post. First Time heard about Steemit ? Click Here To Know Everything About Steemit 

Crop field in my village home

Here I share 4 photographs of crop fields in my village home, India. Pic 1 Pic 2 Pic 3 Pic 4 Tags : Photography, Flowers & Plants photography, Nature, Travel, Landscape photography, Village, India This Post Was Published On My Steemit Blog . Please, navigate to steemit and cast a free upvote to help me if you like my post. First Time heard about Steemit ? Click Here To Know Everything About Steemit 

Amazing arts by unknown artists - Series #21

I captured all these art photographs in the Kolkata Book Fair, 2018. I tried to know the original artists of these awesome arts, but, failed. Enjoy this awesome arts. All credits goes to the unknown artists :) To Be Continued.. Previous Episodes :  Episode#01 ,  Episode#02 ,  Episode#03 ,  Episode#04 ,  Episode#05 ,  Episode#06 ,  Episode#07 ,  Episode#08 ,  Episode#09 ,  Episode#10 ,  Episode#11 ,  Episode#12 ,  Episode#13 ,  Episode#14 ,  Episode#15 ,  Episode#16 ,  Episode#17 ,  Episode#18 ,  Episode#19 ,  Episode#20 Tags : Art, Drawing, Fine arts, Painting, Photography,  This Post Was Published On My Steemit Blog . Please, navigate to steemit and cast a free upvote to help me if you like my post. First Time heard about Steemit ? Click Here To Know Everything About Steemit  $3 Donation [Fixed] Donate $Any Amount

shadows on the stained glass - reflection of minds [An Original Abstract Art] - #03

Here I share my latest work on Abstract Art -- [ Series #03 ] shadows on the stained glass - reflection of minds Tags : Abstract, Art, Drawing, Painting,  This Post Was Published On My Steemit Blog . Please, navigate to steemit and cast a free upvote to help me if you like my post. First Time heard about Steemit ? Click Here To Know Everything About Steemit  $3 Donation [Fixed] Donate $Any Amount

mathematics behind football

Next time you are watching football and you see your most loved quarterback toss a pass finish, consider the math utilized as a part of association with finished pass. Math is utilized as a part of expert football in each work on, preparing camp, pre-season amusement, and standard season diversion. Without math it would simply be a diversion that utilizations pigskin.  We should take a gander at the finished pass and the math included. The quarterback is followed by the rate of culminations endeavored and made, alongside finishing yards. The separation he tossed the ball and which side of the field he through the ball. Also, to the culmination rate taking into account taking the snap from under focus or shotgun. These pigskin numbers are all used to build up a numerical model of the quarterback, for factual examination with different quarterbacks.  The recipient who got the pass is judged on the quantity of passes tossed to him and the quantity of gets. He is likewise jud
Back to Top