WannaCryptor Epidemic Continues

Yaron Tal

WannaCryptor Epidemic Continues

Yaron Tal

Share:

Share on linkedin
Share on facebook
Share on twitter
reposify-smb-vulnerable-map

In the last 48 hours we’ve read many publications about WanaCryptor which is spreading around the world massively, many malware mutations already use CVE-2017-0143 to their infection mechanism without the kill-switch limitation WannaCrypt0r had.

We’ve decided to provide a live map with infected hosts, if you want to access our data to protect your customers, drop a note.

We are monitoring more than 8.5 million computers with exposed SMB, currently, 50K are vulnerable and may be infected in the next hours.

Yaron Tal

Yaron Tal is an accomplished tech entrepreneur and cybersecurity expert with close to two decades of experience in development of software solutions for cybersecurity. Prior to founding Reposify, Yaron held various managerial roles at startups where he gained extensive experience in leading R&D teams and developing successful solutions from the ground up. Yaron is an alumnus of the Israeli Cybersecurity Center where he served for over four years as an embedded system developer, researcher and team leader.

Share:

Share on linkedin
Share on facebook
Share on twitter

Ready to discover your External Attack Surface?

Read Next

Why Only EASM can provide the protection necessary to guard against RCE threat

In April, VMware issued a series of patches to guard against vulnerabilities in a number of products. Among the most critical is CVE-2022-22954, a remote code execution RCE threat that puts organizations at risk of cyber attack. Only EASM can provide thorough cybersecurity protection against remote code execution hacks, with real-time asset monitoring and identification and clear, actionable insights for immediate intervention.

Detect to protect: Reposify’s EASM flags exposed assets vulnerable to Microsoft SMB (CVE-2022-26809)

Microsoft covered more than 100 vulnerabilities in April's security update, among them patches to critical remote code execution (RCE) vulnerabilities located in Microsoft’s SMB. In response Reposify's EASM platform scanned and identified 800,000+ nodes with open SMB protocol on both patched and unpatched systems. Read our latest blog and learn how Reposify's EASM can detect unknown exposed assets vulnerable to Microsoft’s SMB.

Security teams: here’s why you should choose EASM over Shodan?

If you are using Shodan to search for your company’s assets or perform reconnaissance as part of blue or red teams routines - you need to keep reading.