We have been receiving a number of alarmed emails from our customers, WANNACRY IS BACK!
Well, luckily from the nature of WannaCrys origins it isn’t back. That threat was quashed along with the misery the NHS faced whilst it swarmed through their systems. Along with WannaCry ver 2.0 and WannaCry no kill switch.
This new round of emails are just hopeful spammers looking to jump on the back of a newsworthy ransomware attack in the hopes that a few may fall for it.
An example of the spoof emails;
Hello! WannaCry is back! All your devices were hacked with our program installed on them. We have developed operation of our program, so you will not be able to recover your data after the attack.
All the information will be encrypted and then erased. Antivirus software will not be able to detect our program, while firewalls will be bedrid against our unique code.
Should your files be encrypted, you will lose them forever.
Our program also permeates into the local network, erasing data on all computers connected to the network and remote servers, all cloud-stored data, and blocking website operation. We have already deployed our program on your devices.
Followed by Bitcoin instructions.
Steps to take;
If you get this email, usually with bad grammar and spelling mistakes, just delete it and move on.
Your system WILL NOT be infected if you delete this email and take no further action.
And thats it!
We have not been able to pinpoint these scam emails to one particular email leak, so it is likely that they are not even targeted attempts and are using a scatter gun approach from readily available email databases.