Resume: there's a nasty new ransomware variant spreading via an SMB worm (I'm sure that everyone knows this now!)
Windows 10 and Linux/Mac workstations
immune to the SMB exploit
Windows < 10
vulnerable and need March '17 patch in MS March updates:
https://technet.microsoft.com/library/security/MS17-010MS have released a patch for this even for Windows XP, here (
inter alia) if anyone needs it:
http://www.catalog.update.microsoft.com/Search.aspx?q=KB4012598As per the subject: we've had a busy weekend so far checking that Win 7 and 8 (very few of these) workstations @ clients have the appropriate patch (they *should* have, but we are checking also AV/AMWare up to date, there's a new Wannacry variant out that is worse than the Friday one)
I had a look at this:
https://access.redhat.com/solutions/3031551which states not vulnerable to the SMB exploit as I would expect. I trust that this applies to the 9.x codebase?
Can any developer confirm please?I would emphasise that not having this vulnerability ONLY means that the ransomware cannot spread by the SMB MACHINE-TO-MACHINE vector, all other avenues are open, ensure you have updated protection on Windows and secure backups as any SMB workstation can encrypt the data on the server!
There's also a rule to block the SMB exploit for those using Emerging Threats rulesets on firewalls, qv.
MeJ