{"id":12078,"date":"2017-05-13T18:49:19","date_gmt":"2017-05-13T16:49:19","guid":{"rendered":"http:\/\/blogs.sun.ac.za\/it\/?p=12078"},"modified":"2017-06-08T12:02:09","modified_gmt":"2017-06-08T10:02:09","slug":"warning-massive-ransomware-attack-affecting-windows-computers","status":"publish","type":"post","link":"https:\/\/blogs.sun.ac.za\/it\/2017\/05\/warning-massive-ransomware-attack-affecting-windows-computers\/","title":{"rendered":"[:en]Critical ransomware attack targeted Windows computers[:af]Kritiese ransomware val Windows-rekenaars aan[:]"},"content":{"rendered":"<p>[:en]<\/p>\n<div>A serious virulent ransomware threat known as WannaCrypt0r\/WannaCry has been affecting Windows computers on shared networks in at least 150 countries worldwide. Once one computer on a network is affected, the infection easily spreads to other Windows computers on the same network, easily shutting down entire government agencies and national infrastructure companies.\u00a0<a href=\"http:\/\/www.telegraph.co.uk\/news\/2017\/05\/13\/nhs-cyber-attack-everything-need-know-biggest-ransomware-offensive\/\">More information on this attack<\/a><\/p>\n<p>Ransomware is a malicious script or software that installs itself on your computer without you knowing. Once it\u2019s installed and running, it will lock down your system and won\u2019t allow you to access any files or programs on that computer. To unlock your system and regain access to the computer being held hostage, the lock screen informs you that you must pay for an unlock tool or decryption key from the hacker.<\/p>\n<p>If your Windows computer is connected to a shared network, such as those at the University, Information Technology will automatically keep your Windows up-to-date so you don&#8217;t have to.<\/p>\n<p>If you are running Windows and automatic updates are enabled you should be okay. If you don\u2019t and haven\u2019t updated recently you should update to the most recently released version immediately. Information Technology does manage automatic updates on many of our computers, but users also\u00a0have to check their computers, especially with laptops that are taken home, in hostels and connect to other less well-managed networks.\u00a0<\/p>\n<p>Keep an eye open for phishing e-mails requesting that you click on links and fill in your username and password. Beware sites that you visit that have suspicious popups that ask you to install software or \u201cinform\u201d you that your computer is infected with viruses.<\/p>\n<p>Just because the mail <u>looks<\/u> like it has been sent from a university address or the site that you visit <u>looks<\/u> like a university or Internet banking website, don\u2019t be fooled. Check the address and what you are being asked to do. If in doubt ask Information Technology, or your local \u201ccomputer nerd\u201d. They will be able to help and advise you.<\/p>\n<p><a href=\"http:\/\/blogs.sun.ac.za\/it\/en\/?s=ransomware\">More articles on ransomware.<\/a><\/p>\n<p style=\"text-align: right;\">\n [ARTICLE BY DAVID WILES]<\/p>\n<\/div>\n<p>[:af]<\/p>\n<p>Ernstige<em> <a href=\"http:\/\/blogs.sun.ac.za\/it\/en\/2012\/10\/what-is-ransomware\/\">ransomware<\/a>,<\/em> bekend as\u00a0WannaCrypt0r\/WannaCry, het verlede maand Windows rekenaars op gedeelde netwerke in ten minste\u00a0150\u00a0lande aangeval. Sodra een rekenaar op \u0149 netwerk besmet is, versprei die infeksie moeiteloos na ander Windows rekenaars op dieselfde netwerk. Op so \u0149\u00a0\u00a0manier word groot maatskappye, regeringsorganisasies en nasionale infrastruktuur maatskappye maklik en vinnig buite aksie gestel.\u00a0<a href=\"http:\/\/www.telegraph.co.uk\/news\/2017\/05\/13\/nhs-cyber-attack-everything-need-know-biggest-ransomware-offensive\/\">Meer inligting oor hierdie aanval<\/a>.<\/p>\n<p><em>Ransomware<\/em> is \u0149\u00a0\u00a0kwaadwillige\u00a0programmeringskrip\u00a0of sagteware wat op jou rekenaar installeer word, sonder jou wete.\u00a0Sodra dit\u00a0loop op jou rekenaar, word\u00a0jou\u00a0hele stelsel\u00a0geblok\u00a0en\u00a0het jy geen toegang tot jou l\u00eaers of programme op jou rekenaar nie. \u0149 Kennisgewing op jou skerm sal aandui dat jy die kraker moet betaal vir die\u00a0sleutel of die dekripsie-instrument voordat jou stelsel oopgesluit word en jy weer toegang kan kry.<\/p>\n<p>Indien jou Windows-rekenaar\u00a0verbind is aan \u0149 gedeelde netwerk, soos di\u00e9 van die universiteit, hou Informasietegnologie jou rekenaar outomaties\u00a0op datum met Windowsopdaterings sodat jy dit nie hoef te doen nie.<\/p>\n<p>Indien jy Windows gebruik en jou outomatiese\u00a0opdateringsfunksie is geaktiveer, behoort\u00a0jy dus veilig te wees. Indien dit nie is nie en jy lanklaas\u00a0enige\u00a0opdaterings gedoen het, sorg dat jy dadelik die nuutste weergawe kry. Alhoewel Informasietegnologie outomatiese opdaterings doen op die meeste rekenaars, is dit belangrik dat gebruikers self ook hulle rekenaars nagaan. Dis veral van toepassing\u00a0op skootrekenaars wat huistoe\u00a0geneem word en aan tuis, koshuise en ander\u00a0minder veilige reguleerde netwerke verbind.\u00a0<\/p>\n<p>Wees bedag op <em>phishing<\/em> e-posse wat versoek dat jy op skakels kliek en jou gebruikersnaam en wagwoord intik. Oppas vir\u00a0webwerwe\u00a0wat bedenklike\u00a0opspring-skerms het wat vra dat jy sagteware installeer\u00a0of vir jou\u00a0s\u00ea dat\u00a0jou rekenaar besmet is met virusse.<\/p>\n<p>Bloot omdat \u0149\u00a0 e-pos lyk asof dit gestuur is vanaf `n universiteitsadres of die webwerf lyk soos die universiteit of jou bank s&#8217;n, beteken nie dit is nie. Kyk na die webadres en lees noukeurig wat van jou gevra word. As jy enigsins\u00a0twyfel,\u00a0kontak\u00a0IT of jou \u0149\u00a0 IT-kenner wat jy vertrou. Hulle sal jou kan help en raad gee.<\/p>\n<p><a href=\"http:\/\/blogs.sun.ac.za\/it\/en\/?s=ransomware\">Meer artikels oor <em>ransomware.<\/em><\/a><\/p>\n<p>[:]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[:en] A serious virulent ransomware threat known as WannaCrypt0r\/WannaCry has been affecting Windows computers on shared networks in at least 150 countries worldwide. Once one computer on a network is affected, the infection easily spreads to other Windows computers on the same network, easily shutting down entire government agencies and national infrastructure companies.\u00a0More information on [&hellip;]<\/p>\n","protected":false},"author":259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20382,29187],"tags":[29207],"class_list":["post-12078","post","type-post","status-publish","format-standard","hentry","category-email","category-security-2","tag-ransomware"],"publishpress_future_action":{"enabled":false,"date":"2026-05-08 22:55:39","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/12078","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/comments?post=12078"}],"version-history":[{"count":13,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/12078\/revisions"}],"predecessor-version":[{"id":12195,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/12078\/revisions\/12195"}],"wp:attachment":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/media?parent=12078"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/categories?post=12078"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/tags?post=12078"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}