If you were enjoying your past weekend then probably you are stay away offline from past 2 3 days. All of a sudden, last late weekend, all...
If you were enjoying your past weekend then probably you are stay away offline from past 2 3 days. All of a sudden, last late weekend, all over the world are under cyber-attack from malware called WannaCry Ransomware. Probably more than 200000 computer among more than 150 countries are affected now from this attack. Now let us discuss in detail what is WannaCry Ransomware and How it affects to the systems.
What is WannaCry?
WannaCry is one type of the dangerous Trojan virus called Ransomware. As per its name, this virus effects badly on the computer and control all the data of system. It is one type of computer hostage and demand to pay amount in Bitcoin to get Computer data and access back to the victims.
WannaCry control all the computers by encrypting all files to the user’s computer. Then the software which control the data, demand s ransom amount to be paid from that encrypted file to decrypt. WannaCry demands to the victims to pay near about $300 in bitcoins when computer is affected. If the victims doesn’t pay that amount in 3 days then WannaCry demand doubled amount to pay i.e. $600. After that If WannaCry haven’t get any amount within 7 days then all encrypted data will be deleted and victim never get data back to the system.
![]() |
Source By: BGR.com |
Symantec which is a security giant name published a full list of file types that are encrypted by WannaCry which are as under:
- .123
- .3dm
- .3ds
- .3g2
- .3gp
- .602
- .7z
- .ARC
- .PAQ
- .accdb
- .aes
- .ai
- .asc
- .asf
- .asm
- .asp
- .avi
- .backup
- .bak
- .bat
- .bmp
- .brd
- .bz2
- .cgm
- .class
- .cmd
- .cpp
- .crt
- .cs
- .csr
- .csv
- .db
- .dbf
- .dch
- .der
- .dif
- .dip
- .djvu
- .doc
- .docb
- .docm
- .docx
- .dot
- .dotm
- .dotx
- .dwg
- .edb
- .eml
- .fla
- .flv
- .frm
- .gif
- .gpg
- .gz
- .hwp
- .ibd
- .iso
- .jar
- .java
- .jpeg
- .jpg
- .js
- .jsp
- .key
- .lay
- .lay6
- .ldf
- .m3u
- .m4u
- .max
- .mdb
- .mdf
- .mid
- .mkv
- .mml
- .mov
- .mp3
- .mp4
- .mpeg
- .mpg
- .msg
- .myd
- .myi
- .nef
- .odb
- .odg
- .odp
- .ods
- .odt
- .onetoc2
- .ost
- .otg
- .otp
- .ots
- .ott
- .p12
- .pas
- .pem
- .pfx
- .php
- .pl
- .png
- .pot
- .potm
- .potx
- .ppam
- .pps
- .ppsm
- .ppsx
- .ppt
- .pptm
- .pptx
- .ps1
- .psd
- .pst
- .rar
- .raw
- .rb
- .rtf
- .sch
- .sh
- .sldm
- .sldx
- .slk
- .sln
- .snt
- .sql
- .sqlite3
- .sqlitedb
- .stc
- .std
- .sti
- .stw .
- .suo
- .svg
- .swf
- .sxc
- .sxd
- .sxi
- .sxm
- .sxw
- .tar
- .tbk
- .tgz
- .tif
- .tiff
- .txt
- .uop
- .uot
- .vb
- .vbs
- .vcd
- .vdi
- .vmdk
- .vmx
- .vob
- .vsd
- .vsdx
- .wav
- .wb2
- .wk1
- .wks
- .wma
- .wmv
- .xlc
- .xlm
- .xls
- .xlsb
- .xlsm
- .xlsx
- .xlt
- .xltm
- .xltx
- .xlw
- .zip
These are the all the file format WannaCry encrypted and these all files are always available for computer to all users. After encrypted all above files, WannaCry also install a .txt file for into user’s desktop with following note:
![]() |
Source By: BGR.com |
How to defend our computer from WannaCry?
There are some ideas that “might be worked” to get secured from WannaCry. Those ideas are described below:
- Disable Macro Scripts for files which are sent via Email.
- Use Licenced version of Anti-ransomware softwares.
- Block AppData/LocalAppData
- Keep your system or Windows OS updated as per the latest OS version by Microsoft.
- You can also Turn Off the SMB via Windows Features in Windows system.
If you are still not affected by WannaCry then Try this basic tips that might be worked.
If System is attacked then:
If your system is affected by WannaCry then you don’t have any option to decrypt this files. Still we haven’t get any kind of solution to decrypt files so just wait and watch about government officials.
What if pay time gone?
We request all the victims of this malware attack that don’t pay any amount before pay time because some of victims paid that amount even though the files are not decrypt by them. So don’t pay until wait for government official press note.
COMMENTS