{"id":9282,"date":"2017-05-30T09:01:00","date_gmt":"2017-05-30T07:01:00","guid":{"rendered":"https:\/\/www.centsys.co.za\/the-great-cyber-caper-of-2017\/"},"modified":"2017-05-30T09:01:00","modified_gmt":"2017-05-30T07:01:00","slug":"the-great-cyber-caper-of-2017","status":"publish","type":"post","link":"https:\/\/www.centsys.com\/fr\/the-great-cyber-caper-of-2017\/","title":{"rendered":"The Great Cyber Caper of 2017"},"content":{"rendered":"<div style=\"line-height: 150%; text-align: justify;\">On the 12<sup>th<\/sup>of May, an unknown party, or parties, launched a <b>cyberattack<\/b> on an unprecedented scale the aftermath of which is still being felt despite many businesses and private computer users stepping up their cyber security policies.<\/div>\n<div style=\"line-height: 150%; text-align: justify;\"><\/div>\n<table style=\"float: right; margin-left: 1em; text-align: right;\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\"><a style=\"clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;\" href=\"https:\/\/www.centsys.co.za\/\/wp-content\/uploads\/2017\/05\/19192923_l.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.centsys.co.za\/\/wp-content\/uploads\/2017\/05\/19192923_l-300x300.jpg\" width=\"320\" height=\"320\" border=\"0\" data-original-height=\"1600\" data-original-width=\"1600\" \/><\/a><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\">Copyright: <a href=\"https:\/\/www.123rf.com\/profile_aetb\">aetb \/ 123RF Stock Photo<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div style=\"line-height: 150%; text-align: justify;\">Dubbed the <b>WannaCry<\/b> <a href=\"https:\/\/threatpost.com\/meet-the-cryptoworm-the-future-of-ransomware\/117330\/\" target=\"_blank\" rel=\"noopener noreferrer\">cryptoworm<\/a>, the malicious software is said to have infected some <b>230,000 computers<\/b> in <b>150 countries<\/b> worldwide, spreading through networks and bringing affected businesses to a grinding halt by encrypting data and demanding a \u201cransom\u201d of around $300 in return for releasing it. Desperate to have access to their data, many opted to pay the ransom but were never issued with instructions for decryption, and it has been theorised that the attackers themselves are not entirely clear on how to undo the damage done by the appropriately-named ransomware.<\/div>\n<p>&nbsp;<\/p>\n<div style=\"line-height: 150%; text-align: justify;\">Since the attackers demanded that the ransom amount be paid in <b>Bitcoin<\/b>, a ubiquitous cyber-currency which is largely untraceable, no suspects have been identified at the time of writing and data recovery specialists are still scrambling to salvage what they can while cyber security firms are rushing to the aid of the organisations that have been targeted.<\/div>\n<div style=\"line-height: 150%; text-align: justify;\">The attack has raised important questions regarding the efficacy of <b>firewalls<\/b> and <b>antiviruses<\/b>.<\/div>\n<div style=\"line-height: 150%; text-align: justify;\"><b>What exactly is ransomware?<\/b><\/div>\n<div style=\"line-height: 150%; text-align: justify;\">Ransomware is a type of malware (malicious software) that encrypts data on infected machines, making it inaccessible to the user. The attacker then demands a sum of money, or ransom, in return for releasing the data.<\/div>\n<div style=\"line-height: 150%; text-align: justify;\"><b>\u00a0<\/b><\/div>\n<div style=\"line-height: 150%; text-align: justify;\"><b>Who is at risk?<\/b><\/div>\n<div style=\"line-height: 150%; text-align: justify;\"><\/div>\n<div style=\"line-height: 150%; text-align: justify;\">Theoretically, anyone with access to a personal computer or laptop is at risk of falling victim to a ransomware attack, although businesses are at greater risk since malware is often promulgated through company networks.<\/div>\n<div style=\"line-height: 150%; text-align: justify;\"><b>\u00a0<\/b><\/div>\n<div style=\"line-height: 150%; text-align: justify;\"><b>How is the ransomware activated?<\/b><\/div>\n<div style=\"line-height: 150%; text-align: justify;\"><\/div>\n<div style=\"line-height: 150%; text-align: justify;\">The ransomware is activated in a number of different ways, but generally results from opening an email attachment that contains the malicious software. Clicking on suspicious links can also lead to a ransomware attack.<\/div>\n<div style=\"line-height: 150%; text-align: justify;\"><b>\u00a0<\/b><\/div>\n<div style=\"line-height: 150%; text-align: justify;\"><b>What can I do?<\/b><\/div>\n<div style=\"line-height: 150%; text-align: justify;\"><\/div>\n<div style=\"line-height: 150%; text-align: justify;\">According to CENTURION IT manager and network security specialist <b>Paul Mearns<\/b>, the majority of the WannaCry attacks occurred due to attachments from dubious emails being opened.<\/div>\n<div style=\"line-height: 150%; text-align: justify;\"><\/div>\n<div style=\"line-height: 150%; text-align: justify;\">He stresses the importance of not opening emails if one is unfamiliar or uncertain regarding the source.<\/div>\n<div style=\"line-height: 150%; text-align: justify;\"><\/div>\n<div style=\"line-height: 150%; text-align: justify;\">\u201c<b>Don\u2019t open any attachments unless you are 100% sure that the email is safe and that you are familiar with the sender<\/b>,\u201d says Mearns, although he warns that even this is no guarantee of the mail\u2019s integrity.<\/div>\n<div style=\"line-height: 150%; text-align: justify;\"><\/div>\n<div style=\"line-height: 150%; text-align: justify;\">\u201cIf you are unsure of something, contact your company\u2019s IT department. We are here to help\u201d.<\/div>\n<div style=\"line-height: 150%; text-align: justify;\">For a full list of ransomware countermeasures, visit Microsoft\u2019s website or click <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4013550\/windows-protect-your-pc-from-ransomware\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>On the 12thof May, an unknown party, or parties, launched a cyberattack on an unprecedented scale the aftermath of which is still being felt despite many businesses and private computer users stepping up their cyber security policies. Copyright: aetb \/ 123RF Stock Photo Dubbed the WannaCry cryptoworm, the malicious software is said to have infected [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":9394,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_joinchat":[],"footnotes":""},"categories":[50,58,126,187,206,249],"tags":[],"class_list":["post-9282","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-centurion-systems","category-cyber-security","category-hacker","category-ransomware","category-security","category-wannacry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>The Great Cyber Caper of 2017 - Centurion Systems French<\/title>\r\n<meta name=\"description\" content=\"Centurion Systems IT - the majority of the WannaCry attacks occurred due to attachments from dubious emails being opened.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.centsys.com\/fr\/the-great-cyber-caper-of-2017\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"The Great Cyber Caper of 2017 - Centurion Systems French\" \/>\r\n<meta property=\"og:description\" content=\"Centurion Systems IT - the majority of the WannaCry attacks occurred due to attachments from dubious emails being opened.\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.centsys.com\/fr\/the-great-cyber-caper-of-2017\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Centurion Systems French\" \/>\r\n<meta property=\"article:published_time\" content=\"2017-05-30T07:01:00+00:00\" \/>\r\n<meta name=\"author\" content=\"Charl Mijnhardt\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Charl Mijnhardt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-great-cyber-caper-of-2017\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-great-cyber-caper-of-2017\\\/\"},\"author\":{\"name\":\"Charl Mijnhardt\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\"},\"headline\":\"The Great Cyber Caper of 2017\",\"datePublished\":\"2017-05-30T07:01:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-great-cyber-caper-of-2017\\\/\"},\"wordCount\":438,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-great-cyber-caper-of-2017\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"centurion systems\",\"cyber security\",\"hacker\",\"ransomware\",\"security\",\"wannacry\"],\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-great-cyber-caper-of-2017\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-great-cyber-caper-of-2017\\\/\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-great-cyber-caper-of-2017\\\/\",\"name\":\"The Great Cyber Caper of 2017 - Centurion Systems French\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-great-cyber-caper-of-2017\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-great-cyber-caper-of-2017\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2017-05-30T07:01:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\"},\"description\":\"Centurion Systems IT - the majority of the WannaCry attacks occurred due to attachments from dubious emails being opened.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-great-cyber-caper-of-2017\\\/#breadcrumb\"},\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-great-cyber-caper-of-2017\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-great-cyber-caper-of-2017\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/the-great-cyber-caper-of-2017\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Great Cyber Caper of 2017\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\",\"name\":\"Centurion Systems French\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-ZA\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\",\"name\":\"Charl Mijnhardt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"caption\":\"Charl Mijnhardt\"},\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/author\\\/charl\\\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Great Cyber Caper of 2017 - Centurion Systems French","description":"Centurion Systems IT - the majority of the WannaCry attacks occurred due to attachments from dubious emails being opened.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.centsys.com\/fr\/the-great-cyber-caper-of-2017\/","og_locale":"en_US","og_type":"article","og_title":"The Great Cyber Caper of 2017 - Centurion Systems French","og_description":"Centurion Systems IT - the majority of the WannaCry attacks occurred due to attachments from dubious emails being opened.","og_url":"https:\/\/www.centsys.com\/fr\/the-great-cyber-caper-of-2017\/","og_site_name":"Centurion Systems French","article_published_time":"2017-05-30T07:01:00+00:00","author":"Charl Mijnhardt","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Charl Mijnhardt","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.centsys.com\/fr\/the-great-cyber-caper-of-2017\/#article","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/the-great-cyber-caper-of-2017\/"},"author":{"name":"Charl Mijnhardt","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23"},"headline":"The Great Cyber Caper of 2017","datePublished":"2017-05-30T07:01:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.centsys.com\/fr\/the-great-cyber-caper-of-2017\/"},"wordCount":438,"commentCount":0,"image":{"@id":"https:\/\/www.centsys.com\/fr\/the-great-cyber-caper-of-2017\/#primaryimage"},"thumbnailUrl":"","articleSection":["centurion systems","cyber security","hacker","ransomware","security","wannacry"],"inLanguage":"en-ZA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.centsys.com\/fr\/the-great-cyber-caper-of-2017\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.centsys.com\/fr\/the-great-cyber-caper-of-2017\/","url":"https:\/\/www.centsys.com\/fr\/the-great-cyber-caper-of-2017\/","name":"The Great Cyber Caper of 2017 - Centurion Systems French","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.centsys.com\/fr\/the-great-cyber-caper-of-2017\/#primaryimage"},"image":{"@id":"https:\/\/www.centsys.com\/fr\/the-great-cyber-caper-of-2017\/#primaryimage"},"thumbnailUrl":"","datePublished":"2017-05-30T07:01:00+00:00","author":{"@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23"},"description":"Centurion Systems IT - the majority of the WannaCry attacks occurred due to attachments from dubious emails being opened.","breadcrumb":{"@id":"https:\/\/www.centsys.com\/fr\/the-great-cyber-caper-of-2017\/#breadcrumb"},"inLanguage":"en-ZA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.centsys.com\/fr\/the-great-cyber-caper-of-2017\/"]}]},{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/www.centsys.com\/fr\/the-great-cyber-caper-of-2017\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.centsys.com\/fr\/the-great-cyber-caper-of-2017\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.centsys.com\/fr\/"},{"@type":"ListItem","position":2,"name":"The Great Cyber Caper of 2017"}]},{"@type":"WebSite","@id":"https:\/\/www.centsys.com\/fr\/#website","url":"https:\/\/www.centsys.com\/fr\/","name":"Centurion Systems French","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.centsys.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-ZA"},{"@type":"Person","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23","name":"Charl Mijnhardt","image":{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","caption":"Charl Mijnhardt"},"url":"https:\/\/www.centsys.com\/fr\/author\/charl\/"}]}},"_links":{"self":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/9282","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/comments?post=9282"}],"version-history":[{"count":0,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/9282\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/media?parent=9282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/categories?post=9282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/tags?post=9282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}