UDTSecure Threat Advisory – WannaCry Ransomware Hoax
Please be advised that there is a protection racket circulating quickly that is mimicking the WannaCry ransomware attack. The group is tricking organizations into thinking their data will be encrypted and demanding payment to prevent this from happening.
The “attackers” make a monetary demand, trying to charge several thousand dollars for each infected computer. They are even asking for money upfront to not scramble your organization’s computers. As of now, these attackers do not have the malware necessary to make good on their threats.
What should you do to protect yourself? Do not, under any circumstances, pay the attackers. Do not contact the attackers and provide any information. Be sure your organization is secure and protected.
If you have any questions on WannaCry or need to better secure your data, please contact our security experts at 1-800-882-9919
Please see below for an example of an email being sent as part of this hoax
Subject: !!!Warning Wannacrypt!!!
Hello! WannaCry is back! All your devices were cracked with our program installed on them. We have improved operation of our program, so you will not be able to regain the data after the attack.
All the information will be encrypted and then erased. Antivirus software will not be able to detect our program, while firewalls will be strengthless against our unique code.
Should your files be encrypted, you will lose them forever.
Our program also covers the local network, erasing data on all computers connected to the network and remote servers, all cloud-stored data, and freezing website operation. We have already deployed our program on your devices.
Deletion of your data is scheduled for June **, 2018, at **:** – **:** PM. All data stored on your computers, servers, and mobile devices will be destroyed. Devices working on any version of Windows, iOS, macOS, Android, and Linux are subject to data erasion.
With an eye to ensure against data demolition, you can pay 0.1 BTC (~$650) to the bitcoin wallet: ****************