ESET Advises Nigerian Companies on ‘Jaff / WannaCryptor’ Ransomware

Cyber Attack Crime
Cyber Attack Crime
(Last Updated On: )

ESET has advised not open any suspicious emails, indicating the Company is aware of several ransomware outbreaks that stem from malicious emails that can be used to introduce threats to your system.

ESET identifies these threats as Filecoder.WannaCryptor and Filecoder.NLI (Jaff), and ESET detects and blocks these threats and their variants and advised readers to visit for a list of best practices to stop these threats.

“There were reports from our offices across Europe on how fast the spread is and major hospitals, ISPs and Telecommunication companies have already fell victim of the attack. The malicious email campaign stems from the Necurs botnet and spreads the new ransomware at the rate of more than 5 million emails per hour and hitting computers across the globe,” Mr. Olufemi Ake, country manager, ESET Nigeria said in an email to journalists on Sunday.

“Typically, once the victim is infected, their files are encrypted. Unlike the traditional ransomware which leaves a note of the amount required for payment, Jaff Filecoder would advise the victim to visit a payment portal via a Tor site to decrypt their valuable files, said Mr Ake.

According to him, ESET products can detect and block this malware.

He said as an existing ESET client, the Company strongly recommend that you follow the suggestions below to ensure the highest level of security on your computer:

He advised that, “Make sure that ESET Live Grid is enabled in your ESET product. Make sure that your ESET software is upgraded to the latest version and has the latest Virus Signature Database updates. Do not open attachments sent to you in emails from unknown senders. We also recommend that you avoid opening unsolicited email attachments from someone you know and trust. Warn colleagues who frequently receive emails from external sources – for instance financial departments or Human Resources. Regularly back up your data. In the event of infection, this will help you recover all data. Do not leave external storage used for backups connected to your computer to eliminate the risk of infecting your backups. If your system requires Windows Updates to receive the patch for this exploit, create new backups after applying the patch.

Disable or restrict Remote Desktop Protocol (RDP) access (see Remote Desktop Protocol best practices against attacks). Disable macros in Microsoft Office. If you are using Windows XP, disable SMBv1. For more detailed information about how you can use ESET to protect your systems from ransomware infections, see the following Knowledgebase article.”

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

We are sorry that this post was not useful for you!

Let us improve this post!

Tell us how we can improve this post?

Ad 2


Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.