Join our "Ask Me About" community webinar on May 20th at 9 AM CET and 5 PM CET to explore cybersecurity and monitoring for Data Center and edge IT. Learn about market trends, cutting-edge technologies, and best practices from industry experts. Register and secure your Critical IT infrastructure
Critical Update - Ransomware Exploit
Geo SCADA Knowledge Base
Access vast amounts of technical know-how and pro tips from our community of Geo SCADA experts.
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for
Show only
|
Search instead for
Did you mean:
Invite a Co-worker
Send a co-worker an invite to the portal.Just enter their email address and we'll connect them to register. After joining, they will belong to the same company.
You have entered an invalid email address. Please re-enter the email address.
This co-worker has already been invited to the Exchange portal. Please invite another co-worker.
Please enter email address
Send InviteCancel
Invitation Sent
Your invitation was sent.Thanks for sharing Exchange with your co-worker.
Beginning early on Friday, May 12th 2017, a ransomware variant using the EternalBlue exploit for Microsoft Windows began spreading rapidly, locking down businesses and users in more than ninety countries. Tens of thousands of instances of the malware have been detected. This new ransomware variant known as WannaCry, WCry, WannaCrypt, or Wanna Decryptor, targets and exploits a previously known Microsoft SMB vulnerability.
This update has been verified during the March 2017 MS Update Testing activities for supported versions of ClearSCADA and their supported Operating System versions.
Immediately update your virus definitions (DAT file). McAfee has released an emergency DAT to include coverage for Ransom-WannaCry.
We recommend keeping your virus definition files current by updating frequently.
Ensure you have recent backups. This alone is the most effective way to recover from a ransomware attack.