My dedicated server have been hit by WannaDecryptor but i've done nothing that could have leaded to an infection of it, how is it possible ?
(and by nothing, I mean litterally nothing, It was on a standby since 3 days, I've connected via the windows remote desktop sooner today and tonight I was infected)
Which Server OS version do you use? If it's Server 2008, it's probable that you haven't used Windows Update to fix the critical exploit that was deployed back in March to fix this. I'm guilty of this also - but I can't seem to find which KB fixes this exploit.
Unofficial patch for the Apple SSL/TLS bug in SecureTransport 55741 (CVE-2014-1266). And Windows Server 2003, broadly available for download here. Windows 8 or Windows Server 2003 and read. Microsoft's Patches - WannaCry Ransomware - Win XP Win Server 2003 & Windows 8. Windows 8, and Windows Server 2003, broadly available for download (see links below). Customers who are running supported versions of the operating system (Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8.1, Windows Server 2012. # KB4013429 KB4019472 KB4015217 KB4015438 KB4016635 - Windows Server 2016 # KB4012598 - Windows Vista # KB4012212 KB4012215 KB4019264 KB4015549 - Windows 7 # KB4012213 KB4012216 KB4015550 KB4019215 KB4015553 KB4012219 - Windows 8.1 # KB4012606 KB4013198 KB4013429 - Windows 10 # KB4012598 - Windows XP # KB4012598 - Windows 2003 # KB4012598. Windows XP, Windows 8, and Windows Server 2003 users can download the patch from the Microsoft Update Catalog, and the software giant recommends everyone to update their systems as soon as. Server 2003 and MS17-010, (Wanna Cry), Fix Issues Hello, Since installing MS17-010, (wanna cry fix), on a 2003 server the server will not connect to any of the network drives. KB Numbers for Wanna Cry Patches for windows versions such as Windows 7 (Without SP1), Windows 8, Windows Server 2008 (Standard Edition), Windows Server 2003. I Can't find anything on the Microsoft website related to the KB details for preventing against Wanna cry attack on windows versions such as Windows 7 (Without SP1), Windows 8, Windows. WannaCry – Microsoft issued emergency patches for Windows XP and Server 2003 May 13, 2017 By Pierluigi Paganini Microsoft issued security patches for Windows XP and Server 2003 in response to the WannaCry ransomware attacks.
So how do we go about decrypting our files after the virus is removed? It seems like it's the same variation of the old Ransom:Win32.Vigorf.A. All anti-viruses and threads I have seen tell you just how to remove the virus, but has anyone managed to decrypt their files? Also which KB update fixes this exploit? It seems to only affect Windows 7/2008 machines (and probably XP too).
Downloading windows 10 iso, will try to catch the virus on VM, because can't find virus example in Google)
Wanna Cry Server 2003 Patch
You probably won't be able to catch the virus on anything newer than Server 2012/2016 or Windows 8/10, it only seems to be hitting older operating systems where the exploit isn't fixed due to lack of Windows Updates (correct me if I'm wrong).
Wanna Cry Server 2003
I do have the virus archived though, I can share it with you if you wish, if it's not against the forum's rules.
Yes I was... Hope there will be a solution to decrypt, do you think it will be released to the public if the NHS resolve the crypted problem ?