HOW TO MITIGATE “WANNACRY”
RANSOMEWARE
SECURITY BUG FIXES FOR WINDOWS OS
Emeka Onuzuruike
CONTENT
• What is “Wannacry” Ransomeware?
• What does it attack?
• What is the Ransome?
• How to Mitigate against it
• Recommendations
RANSOMEWARE “WANNACRY” – WHAT IS IT?
It is a maleware that “seizes your PC or your Organization’s IT assets and asks for a “ransome” in
return, more of like a kidnapper who kidnaps his victim and asks for “ransome” money for the
subjects freedom.
Read more via this URL: https://securelist.com/blog/research/78411/wannacry-faq-what-you-
need-to-know-today/
RANSOMEWARE “WANNACRY” – WHAT IS IT?
It is a maleware that “seizes your PC or your Organization’s IT assets and asks for a “ransome” in
return, more of like a kidnapper who kidnaps his victim and asks for “ransome” money for the
subjects freedom.
RANSOMEWARE “WANNACRY” – WHAT IS THE
RANSOME?
The “attacker” target’s victim’s PC files by encrypting them.
The victim must pay via Bitcoin
The attacker gives the “victim” his terms for redemption!!! Very, very, very sad indeed.
WANNACRY – IMMEDIATE MITIGATION
• You can check your PC’s status by yourself by following the steps below:
• > Go to Control Panel>>> Program and Features
• >Go to search updates (Upper right corner)
• >If you are running Windows 7 Search(via Google or other search engine) for
KB4012212. If you are running Windows 8.1 Search for KB4012213
• If you are running windows 10 Search for KB4013198
• Install the relevant Windows security patch.
• See URL : http://www.catalog.update.microsoft.com/Home.aspx
WANNACRY – KNOW YOUR WINDOWS VERSION
• You can check your PC’s Window’s version as below:
• On your PC, go to All Programs>>System Information
SOME STATS
BE SAFE
Image credit – alamy stock photos
Image credit - briteccomputers.co.uk

More Related Content

PPTX
WannaCry Ransomware
PDF
Ransomware: Wannacry
PDF
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
PPTX
Wannacry
PPT
Protecting Your organization from WannaCry Ransomware
PDF
How to Help Your Customers Protect Themselves from Ransomware Attacks
PPTX
Cryptojacking - by Vishwaraj101
WannaCry Ransomware
Ransomware: Wannacry
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Wannacry
Protecting Your organization from WannaCry Ransomware
How to Help Your Customers Protect Themselves from Ransomware Attacks
Cryptojacking - by Vishwaraj101

What's hot (20)

PDF
Wannacry | Technical Insight and Lessons Learned
PPTX
Presentation of Cyber terrorism, Bitcoins & Ransomware
PDF
Million Browser Botnet
PDF
Ransomware is Here: Fundamentals Everyone Needs to Know
PPTX
Cryptolocker Ransomware Attack
PPTX
Malware's Most Wanted: CryptoLocker—The Ransomware Trojan
PPTX
Ransomware 2017: New threats emerge
PPTX
Invincea fake british airways ticket spear-phish malware 03-21-2014
PPTX
Blackhat USA 2014 - The New Scourge of Ransomware
PPTX
Shamoon attacks - Destructive malware targeting Middle East organizations
PPTX
Ransomware the clock is ticking
PPTX
Ransomware: Mitigation Through Preparation
PDF
An Inside Look At The WannaCry Ransomware Outbreak
PPTX
Dragonfly: Western energy sector targeted by sophisticated attack group
PPTX
Threat landscape update: June to September 2017
PDF
Wannacry Virus
PDF
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
PDF
Webinar: A deep dive on phishing, today's #1 business threat
PDF
Webinar: 10 steps you can take to protect your business from phishing attacks
PDF
Webinar: How hackers are making your security obsolete
Wannacry | Technical Insight and Lessons Learned
Presentation of Cyber terrorism, Bitcoins & Ransomware
Million Browser Botnet
Ransomware is Here: Fundamentals Everyone Needs to Know
Cryptolocker Ransomware Attack
Malware's Most Wanted: CryptoLocker—The Ransomware Trojan
Ransomware 2017: New threats emerge
Invincea fake british airways ticket spear-phish malware 03-21-2014
Blackhat USA 2014 - The New Scourge of Ransomware
Shamoon attacks - Destructive malware targeting Middle East organizations
Ransomware the clock is ticking
Ransomware: Mitigation Through Preparation
An Inside Look At The WannaCry Ransomware Outbreak
Dragonfly: Western energy sector targeted by sophisticated attack group
Threat landscape update: June to September 2017
Wannacry Virus
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Webinar: A deep dive on phishing, today's #1 business threat
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: How hackers are making your security obsolete
Ad

Similar to Wannacry (20)

PPTX
Icspa virus removal
PDF
What is ransomware?
PDF
What is Ransomware?
PPTX
Invincea fake british airways ticket spear-phish malware 03-21-2014
PPTX
Surfing with Sharks KS ED TECH 2012
PPT
How safe is your computer?
PPT
Computer saftey may 2013
PDF
Ransomware all locked up book
PPTX
MALWARE AND ITS TYPES
PDF
What is Ransomware? A Quick Guide
PDF
What Is Ransomware | IIFIS Certification
PPT
Malware
PPTX
Ransomware by lokesh
PPTX
Proofing against malware
PPTX
PPTX
malware
PPT
Wannacry-A Ransomware Attack
PPTX
Best & Worst of Cybersecurity
PDF
Things that go bump on the web - Web Application Security
PDF
Prevent Phishing Attacks – CRI Advantage
Icspa virus removal
What is ransomware?
What is Ransomware?
Invincea fake british airways ticket spear-phish malware 03-21-2014
Surfing with Sharks KS ED TECH 2012
How safe is your computer?
Computer saftey may 2013
Ransomware all locked up book
MALWARE AND ITS TYPES
What is Ransomware? A Quick Guide
What Is Ransomware | IIFIS Certification
Malware
Ransomware by lokesh
Proofing against malware
malware
Wannacry-A Ransomware Attack
Best & Worst of Cybersecurity
Things that go bump on the web - Web Application Security
Prevent Phishing Attacks – CRI Advantage
Ad

Recently uploaded (20)

PDF
Human Computer Interaction Miterm Lesson
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PPTX
Presentation - Principles of Instructional Design.pptx
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
The AI Revolution in Customer Service - 2025
PDF
substrate PowerPoint Presentation basic one
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
PDF
CEH Module 2 Footprinting CEH V13, concepts
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
Auditboard EB SOX Playbook 2023 edition.
Human Computer Interaction Miterm Lesson
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Presentation - Principles of Instructional Design.pptx
Connector Corner: Transform Unstructured Documents with Agentic Automation
The AI Revolution in Customer Service - 2025
substrate PowerPoint Presentation basic one
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
SGT Report The Beast Plan and Cyberphysical Systems of Control
Early detection and classification of bone marrow changes in lumbar vertebrae...
Advancing precision in air quality forecasting through machine learning integ...
Introduction to MCP and A2A Protocols: Enabling Agent Communication
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Basics of Cloud Computing - Cloud Ecosystem
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
CEH Module 2 Footprinting CEH V13, concepts
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Auditboard EB SOX Playbook 2023 edition.

Wannacry

  • 1. HOW TO MITIGATE “WANNACRY” RANSOMEWARE SECURITY BUG FIXES FOR WINDOWS OS Emeka Onuzuruike
  • 2. CONTENT • What is “Wannacry” Ransomeware? • What does it attack? • What is the Ransome? • How to Mitigate against it • Recommendations
  • 3. RANSOMEWARE “WANNACRY” – WHAT IS IT? It is a maleware that “seizes your PC or your Organization’s IT assets and asks for a “ransome” in return, more of like a kidnapper who kidnaps his victim and asks for “ransome” money for the subjects freedom. Read more via this URL: https://securelist.com/blog/research/78411/wannacry-faq-what-you- need-to-know-today/
  • 4. RANSOMEWARE “WANNACRY” – WHAT IS IT? It is a maleware that “seizes your PC or your Organization’s IT assets and asks for a “ransome” in return, more of like a kidnapper who kidnaps his victim and asks for “ransome” money for the subjects freedom.
  • 5. RANSOMEWARE “WANNACRY” – WHAT IS THE RANSOME? The “attacker” target’s victim’s PC files by encrypting them. The victim must pay via Bitcoin The attacker gives the “victim” his terms for redemption!!! Very, very, very sad indeed.
  • 6. WANNACRY – IMMEDIATE MITIGATION • You can check your PC’s status by yourself by following the steps below: • > Go to Control Panel>>> Program and Features • >Go to search updates (Upper right corner) • >If you are running Windows 7 Search(via Google or other search engine) for KB4012212. If you are running Windows 8.1 Search for KB4012213 • If you are running windows 10 Search for KB4013198 • Install the relevant Windows security patch. • See URL : http://www.catalog.update.microsoft.com/Home.aspx
  • 7. WANNACRY – KNOW YOUR WINDOWS VERSION • You can check your PC’s Window’s version as below: • On your PC, go to All Programs>>System Information
  • 9. BE SAFE Image credit – alamy stock photos Image credit - briteccomputers.co.uk