Akwa Ibom State University (AKSU) is a conventional academic institution whose vision seeks to keep aflame the pursuit of Knowledge, Excellence and the spirit of enquiry. AKSU also offers opportunities for Learning and Leadership, Service and Self-actualization to all mankind, towards a Peaceful, Humane, Prosperous and just Society.

Thursday, June 29, 2017

Ransomware - the New name of Cyberattack ...NITDA responds.

The management of National Information Technology Development Agency (NITDA) would like to bring to the attention of Nigerians on another deadly cyber-attack, similar to the recent ‘WannaCry’ attack. This attack, called Petya Ransomware or ‘GoldenEye’, not only encrypts files but also encrypts hard drives, rendering entire computer system inaccessible.  

The attack has paralysed businesses across the world and is spreading quickly with reports indicating that countries affected so far include Ukraine, Denmark, Russia, the UK, Germany, France, Italy, Poland and the USA. The malware is spreading using a vulnerability in Microsoft Windows that was patched in March 2017 -  the same bug that was exploited by the WannaCry ransomware.

While our CERRT team are working round the clock along with other stakeholders to come up with effective defence mechanism for the Nigerian cyberspace, we are calling on Network Administrators in the public and private sectors as well as individuals to take the following measures recommended during the recent WannaCry attack:

- Isolate the system from your network to prevent the threat from further spreading;
- Remove the system from Network; and
- Do not use flash/pen drive, external drives on the System to copy files to other systems.

As a general precautionary measure and as the security of systems is our collective responsibility, we would like to recommend that individuals and organisations should:
(a) Regularly update their operating systems with the latest patches;
(b) Regularly update their software applications with latest patches;
(c) Turnoff unnecessary/unneeded features;
(d) Avoid downloading and opening unsolicited files and attachments;
(e) adjust security software to scan compressed or archived files; and
(f) Avoid indiscriminate use wireless connections, such as Bluetooth or infrared ports.

No comments :

Post a Comment