We have been flooded with questions related to the recent NSA leaked exploit turned Ransomware, so we would like to discuss these concerns publicly.
First, our servers are patched and protected (since the update was released back in March). As well, none of the servers that ASPnix directly manages (such as web servers, mail servers, hyper-v hosts and SQL hosts) run the SMB v1 server that is being exploited by the W* Cry Ransomware.
We recommend that customers who manually manage their Windows Updates, update their systems ASAP. Customers who rely on ASPnix to manage their dedicated servers (such as Greenfolders hosted customers) are already patched and have nothing to worry about. A good update plan and procedure should be #1 priority if you are running and maintaining your own server.
Our network security team has started blocking ports 135, 137, 138, 139, 445 globally across our networks to prevent any exploits from occurring on unpatched customer systems.
More information about this exploit can be found here – https://blog.varonis.com/massive-ransomware-outbreak-what-you-need-to-know/
More information related to the patch from Microsoft can be found here – https://technet.microsoft.com/en-us/library/security/ms17-010.aspx
This exploit is not targeting just Windows servers, Microsoft has released patches for Windows 10 all the way down to Windows XP. So make sure you check for updates on your home and workstation Windows computers as well!
If you have any questions or concerns, please contact our support department and we will be happy to help you!
Thank you for choosing ASPnix!