{"id":157248,"date":"2017-05-15T09:03:00","date_gmt":"2017-05-15T14:03:00","guid":{"rendered":"https:\/\/www.ntegrait.com\/are-you-prepared-to-face-wannacry-ransomware-2-0\/"},"modified":"2017-05-15T09:03:00","modified_gmt":"2017-05-15T14:03:00","slug":"are-you-prepared-to-face-wannacry-ransomware-2-0","status":"publish","type":"post","link":"https:\/\/ntegrait.com\/are-you-prepared-to-face-wannacry-ransomware-2-0\/","title":{"rendered":"Are you prepared to face WannaCry Ransomware 2.0?"},"content":{"rendered":"
<\/p>\n
It\u2019s been all over the news.<\/strong><\/p>\n And as you have probably heard, it\u2019s only getting worse.<\/p>\n WannaCry version #1 was destructive for those affected by the ransomware causing downtime, disruption, lost revenue, and in the case of the National Health Service hospitals in the UK \u2013 putting lives at risk.<\/p>\n But WannaCry version #1 had a fault.<\/strong><\/p>\n A 22-year-old, anonymous security analyst known as MalwareTech discovered that there was a \u201ckill switch\u201d\u00a0 buried in the code of this vicious ransomware. This \u201ckill switch\u201d consisted of an unregistered web address. When the virus first contacted a victim\u2019s computer, it would reach out to this web address buried in the code. If it received a reply from the address, the WannaCry ransomware would shut down entirely.<\/p>\n But here\u2019s the problem\u2026<\/u><\/p>\n Version #2 of WannaCry \u00a0\u2013 WannaCry 2.0 \u2013 \u00a0is coming out and promises to be worse than the first.<\/strong><\/p>\n The analyst who discovered the original \u201ckill switch\u201d has stated, \u201cVersion 1 of WannaCrypt (also known as WannaCry) was stoppable, but version 2.0 will likely remove the flaw. You\u2019re only safe if you patch ASAP.\u201d<\/p>\n Can\u2019t patch your computers?<\/p>\n