Representative of Indonesia Security Incident Response Team on Internet Infrastructure (ID-SIRTII), Adi Jaelani revealed, WannaCry Ransomware attacks actually will not work if Windows users diligently update patch to patch the security gaps. Because in fact Microsoft itself as the owner of Windows operating system has released patch MS17-010 (https://technet.microsoft.com/en-us/library/security/ms17-010.aspx) in March 2017 ago.
Unfortunately in the case of Ransomware WannaCry attacks, most systems have not been updated so that the resulting number of infected malware is so great.
"This is an important lesson for us together, if the IT admin (tech information) are diligent in patching Windows, their device will not be exposed to Wanscry Ransomware attacks, although the update is always issued by Microsoft to patch the security gaps that allow malicious programs Attack, "said Adi Jaelani, Jakarta, Monday (15/5).
In addition, Adi also reminded to always be careful when opening documents from emails that are not recognized. The reason Ransomware often enter via hoax or phishing email. To add defense protection, it is advisable to use AntiVirus.
Meanwhile, Threat Lab Team Lead at Avast, Jakub Kroustek, said, until now the Avast has done 195.000 detection Ransomware WannaCry around the world. Especially in Indonesia alone, he added, found 320 detection.
"The word Detection itself means, Avast has managed to protect its users against such cyber attacks," said Jacob.
Ransomeware WannaCry uses tools developed by the US National Security Agency's NSA (National Security Agency). This tool successfully leaked by a group of hackers named Shadow Brokers.The findings of French researchers said that the tool has a code EternalBlue that has the ability to exploit gaps in Microsoft Windows.