Headlines Real Estate News TREC News Contact Us Report News

Clarksville Association
Eastern Middle TN Association
Greater Nashville Association
Middle Tennessee Association
Robertson County Association
Southern Middle TN Association
Sumner Association of Realtors
Upper Cumberland Association     
Warren County Board of Realtors
Williamson County Association

Bristol TN-VA Association
Greater Chattanooga Association
Great Smoky Mntns Association
Knoxville Area Association
Lakeway Area Association
Northeast TN Association
River Counties Association

Central West TN Association
Reelfoot Regional Association
Tennessee Valley Association
Memphis Area Association

Links to REALTOR  Associations Across Tennessee

'WannaCry' Ransomware Evolves Despite Attempts to Kill it

May 14, 2017

Several years ago the Dickson County Sheriff’s Department had to pay a ransom to regain control of their computers.  I believe the same happen to Bradley County. The point is, even law enforcement can be a victim of ransomware. And even as I write this article, I recived an email inviting me to take advantage of a discount for my Costco Membership  --- I am not a member.

The real estate industry has become so dependent upon Internet communications. We as real estate agents are at loss if we

Real Estate News

can’t function online. We also owe a responsibility to our clients and customers to keep their information secure. Computer security is a must.

Their have been a lot said of a new ransomware over the weekend and the news continues. There were predictions that the fast-spreading "WannaCry " (aka "WannaCrypt") ransomware would quickly evolve to get around its domain-based kill switch, and, well... the predictions were right. Security researchers have discovered variants of the Windows malware that either have different kill switches (easy to stop by purchasing the web domain) or don't have a kill switch at all. MalwareTech's initial findings might have stopped the original WannaCry in its tracks, but that was really just a speed bump for malicious coders.

In the meantime, the NSA-derived attack has affected companies and infrastructure well beyond the UK's National Health Service. French car manufacturer Renault has confirmed to Reuters that it stopped production at multiple sites on May 13th to limit the reach of WannaCry. It plans to resume business as usual on Monday, but that's a significant setback for a company that counts on continuous manufacturing. FedEx, Telefonica, Germany's railway system and other big names have also been hit, although not always so dramatically. Europol's Rob Wainright reports that the ransomware has hit about 200,000 computers in over 150 countries, and believes that the problem is getting worse, not better. It could be particularly bad on Monday, when many businesses switch on their computers and might expose unpatched systems to attack.

There will be solutions to this particular attack: more organizations will patch their PCs, and updated antivirus software will catch the malware. The big question is whether or not this will prompt a broader change in security policy. Many of the victims fell prey simply because their systems were running Windows XP or Server 2003, both of which have lost official support outside of special contracts. While it would be unrealistic to expect everyone to always run the latest operating system (software compatibility and cost are major concerns), you may well see repeat incidents unless these large-scale customers get in the habit of staying reasonably up to date.

The bottom line is  --- if you do not understand completely an email request and what you are being asked to click on or open  -- Then Don’t do it – don’t click!!!