This paragraph from a security organization points to what I am saying....
So if this version is one designed to attack the Windows SMBv1 vulnerability and phishing was not the delivery system ..what was it then???Do not open unsolicited emails or messages from unknown senders – Many ransomware variants are distributed through phishing attacks or email attachments. Increased mindfulness when handling ‘suspect’ emails can be effective in combating ransomware
AND if many MS users conducted their MS March 2017 patching session then they should not have been affected.....WHICH after the Wannacry attack actually did occur especially in Ukraine and other countries that got hit by Wannacry.....
So how did this ransomware sidestep phishing and sidestep the MS patch??
AND why did it not trigger a large number of anti viral software packages.....
Bookmarks