WanaCrypt0r 2.0 Ransomware: Virsae's Response

As you are probably aware, over the weekend there was a ransomware attack that affected thousands of computer systems across the globe.

This attack used malicious software called “WanaCrypt0r 2.0” or WannaCry, that exploits a vulnerability in Windows. Microsoft released a patch for the flaw in March, but computers that have not installed the security update remain vulnerable.

Virsae has already put steps in place to mitigate any negative consequences from WanaCrypt0r 2.0.

To find out what steps we have put in place and actions Virsae Business Partners or their customers should take please read the information below . 

Virsae cloud computing service

All Azure cloud computing resources have been patched for this vulnerability

Customers with Virsae supplied appliances

For customers using a Virsae supplied appliance: 

  • The onsite appliances have already been patched for this vulnerability
  • The onsite appliances have a firewall rule blocking SMB Traffic which stops this exploit anyway

As a further precaution, our team is manually reviewing all customer appliances to check if any have not been updated for any reason. We will be in touch if any of these need manual intervention from Business Partners or Customers.

Customers with VSM Software Only clients

For customers hosting the VSM Software Client on their own operating systems we strongly suggest that the operating system is patched according to the manufacturer's recommendations as soon as possible.

Customers using Raspberry Pi appliances do not need to do anything to their operating system.

Please contact us if you have any questions.