Windows exploit notice

Windows exploit
Today new ransomware appeared on the Internet which abuses a Windows 7/2008/2012 exploit in the SMBv1 service. Alot of desktop computers and servers over the world are being infected at the moment. Therefor we would like to remind you to run the latest Windows updates and disable the SMBv1 service within PowerShell:
Set-SmbServerConfiguration -EnableSMB1Protocol $false
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" SMB1 -Type DWORD -Value 0 -Force

This should protect you against this malicious software.
Please let us know if you have any questions.
Выделенные серверы OVH
Выделенные серверы Hetzner

0 комментариев

Оставить комментарий