Earlier today, 5/12/2017, the world saw a massive cyberattack that spread globally in only a matter of minutes.
The initial attack vector has been email, through spam. These messages are typically fake invoices, job offers and other lures which are sent to random email addresses. Within the email is a .zip file and once clicked, that initiates the WannaCry infection.
The file extension used is .wncry, which drops a ransomware notification named: @Please_Read_Me@.txt in common file and folder locations.
Earlier this month, independent researchers scanned the internet and deemed there were 150,000 computers open to this vulnerability.
Microsoft released a patch for this particular vulnerability in March and we recommend that everyone install this patch immediately.
Click here for more information about the patch and the Windows versions and editions impacted by this exploit.
There are IDS rules available that can be used to help stop the spread of this attack.
VIPRE includes IDS rules to block EternalBlue.