Today new ransomware appeared on the Internet which abuses a Windows 7/2008/2012 exploit in the SMBv1 service. Alot of desktop computers and servers over the world are being infected at the moment. Therefor we would like to remind you to run the latest Windows updates and disable the SMBv1 service within PowerShell:
Set-SmbServerConfiguration -EnableSMB1Protocol $false Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" SMB1 -Type DWORD -Value 0 -Force
This should protect you against this malicious software.
Please let us know if you have any questions.