As estatísticas da Kaspersky Lab indicam que o WannaCry ataca no Windows 7 representaram 98% do número total de infecções. Mais particularmente, sobre 60% dos sistemas atacados pelo WannaCry estavam executando a versão de 64 bits do Windows 7, enquanto que 32% of victims were on the 32-bit version of the operating system. This news is not surprising because Windows 7 is still the most preferred desktop operating system with a market share close to 50%.
janelas 7: Highest WannaCry Ransomware Infection Rates
What is paradoxical here is that Windows 7 was supposed to be protected against the WannaCry ransomware campaign because Microsoft issued patches to stop the infection in March this year. But as it turned out – it wasn’t, and it got massively hit.
The popularity of the operating system almost means that approximately 1 no 2 machines are still on Windows 7, easily illustrating the high infection rates. Infelizmente, it is still a very pirated OS, meaning that millions of users are running pirated software, particularly in countries such as Russia and China. Escusado será dizer, running copies of the OS that are not genuine is very dangerous – in most cases they cannot be updated as users have stopped updates to prevent the copy from checking for genuine product keys.
Mesmo que o Windows 7 will be supported until January 2020, users running it may want to start thinking about migrating to a newer version, security experts advise. Getting the latest security updates as soon as possible is also crucial to safety against attacks such as WannaCry.
“oops, seus arquivos importantes são criptografados” is what victims of WannaCry see after their computers are infected. Uma vez que isso aconteceu, the ransomware infection begins to append encryption algorithms to make the documents on the affected computers no longer readable. Então, !Por favor Read Me!.txt file is dropped on the targeted aiming to get victims to download a decryptor from a dropbox account. Finalmente, the ransomware demands 300$ in BTC payoff to get the data back.