On May 12, a computer worm called WannaCry began infecting over
300,000 Windows computers in 150 countries—and made headlines around the world. Here’s what you need to know.
Meet ransomware
Why the headlines? First, because WannaCry is one of the most widespread cases of ransomware
—software
that encrypts all of the files on your PC, and will not unlock them
until you pay the bad guys. In WannaCry’s case, you’re supposed to pay
$300 within three days; at that point, the price goes up. If you still
haven’t paid in a week, all your files are gone forever. (
Here’s what it looks like if you’re infected.)
(Why
can’t the authorities just track who the money’s going to, and thereby
catch the bad guys? Because you have to pay in Bitcoin, which is a
digital currency whose transactions are essentially anonymous. Here’s
my explainer on Bitcoin.)
The
second notable feature: The WannaCry malware took advantage of a
security hole in Windows that had already been discovered by the
U.S. National Security Agency (NSA). But instead of letting Microsoft (
MSFT) know what it had found, the NSA kept it a secret and, in fact, decided to write a “
virus” of its own to exploit it.
Ransomware is nasty.
There’s no way out, no fix. And even if you pay up, there’s no
guarantee you’ll get your files back; some of these ransomware people
take your money and run. (Why can’t these low-life hackers have more of a
sense of decency?)
How security holes get patched
So
why doesn’t Microsoft fix Windows’s security holes? It does—all the
time. For example, if you have Windows 10, you’re safe from WannaCry.
And even if you have Windows 7 or 8, and you accept Microsoft’s steady
flow of software updates, you’re fine, too; Microsoft patched this hole
back in March.
The
only people vulnerable to WannaCry are people running old versions of
Windows, and people who don’t keep their Windows updated with
Microsoft’s free patches.
Here’s
the real irony: Typically, a researcher discovers a security hole in
Windows—and quietly tells Microsoft. Microsoft’s engineers write and
release a patch—for a hole the hackers hadn’t known about before. But
the bad guys know that millions of people won’t install that patch.
So they write the virus after Microsoft has fixed the hole! They get the idea from the fix.
In
any case, ransomware loves to target corporate networks: hospitals,
banks, airlines, governments, utility companies, and so on. These are
places that often don’t regularly update their copies of Windows. (Lots
of them still run Windows XP, which is 16 years old. Microsoft no longer
supports Windows XP, but to its credit, it has written and released a
patch to prevent WannaCry for Windows XP, too.)
How not to get ransomware
If you’d rather not get a ransomware infection on your PC, here’s what to do.
- Back up your computer. I know you know. But only 8% of people backup daily, according to a 2016 poll of over 2,000 people. For $74, you can get a 2-terabye backup drive,
and use your PC’s automatic backup software. Thereafter, if your files
get locked by ransomware, you lose only a couple of hours as you restore
from your backup. (For best results, keep the backup drive detached
when you’re not using it, since some ransomware seeks out other
connected drives.)
- Turn on automatic updating of Windows. Get those patches before the bad guys do.
- Don’t open file attachments you’re not expecting.
Even if they seem to come from people you know. Don’t open zip files
that come by email. Don’t ever click links that seem to be from your
bank, or Google, or Amazon; they’re just trying to trick you into giving
them your passwords. Here’s my explainer on those “phishing” scams.
Backup, turn on updating, don’t open email attachments you’re not expecting.
This has been a public service message.
Related Posts: Safety