New ransomware attack overstated by the media, here is how to stop it.

Posted: May 16, 2017. At: 8:08 AM. This was 9 months ago. Post ID: 10695
Page permalink.
WordPress uses cookies, or tiny pieces of information stored on your computer, to verify who you are. There are cookies for logged in users and for commenters. These cookies expire two weeks after they are set.

Wannacry ransomware screen.
Wannacry ransomware screen.

The new ransomware threat in the wild is quite amazing, but it relies on your machine having ports open to the web and the SMB service running in Windows. A lot of existing machines might have this service running and they might not be patched at all. Since this was known about for many months, I blocked port 445 on my router and my firewall long before this current news craze came about, the Wikileaks CIA tools release contained information about a port 445 exploit. This is very old news. If this service is shut down then your machine is not as susceptible to the malware as it would be if the user had a vanilla Windows machine that was more vulnerable to the exploit. There are ways to stop this from running on your machine.

Look for this registry entry.


If there is a key named SMB1 in here, set the DWORD value to 00000000. My Windows 7 installation did not even have SMB1, but if it is here, disable it.

Lanman registry entries.
Lanman registry entries.

How to enable and disable SMBv1, SMBv2, and SMBv3 in Windows and Windows Server.,-smbv2,-and-smbv3-in-windows-vista,-windows-server-2008,-windows-7,-windows-server-2008-r2,-windows-8,-and-windows-server-2012.

This command in Windows 10 will disable the SMB service.

Disable-WindowsOptionalFeature -Online -FeatureName smb1protocol

Scan your machine for any open ports here:

Install Windows updates:

Microsoft Technet guide on installing Windows updates to combat this malware.

Neither of these methods contain any telemetry or GWX related updates.

General information about Ransomware on Windows.

This will keep your Windows machine safe from the exploit. Not downloading shady software from websites will also help. Most download sites offer MD5 or SHA256 hashes of software downloads, this allows the user to compare the downloaded file and make sure it has not been tampered with.

No comments have been made. Use this form to start the conversation :)

Leave a Reply