If you are following the news, by now you might be aware that a security researcher has activated a "Kill Switch" to stop WannaCry ransomware from spreading further, but it's not over, criminals are now launching attacks using WannaCry 2.0 that do not have 'kill-switch' domain connect function.
WannaCry infections are raising even hours after kill-switch was triggered, from 100,000 to 213,000 computers across 99 countries, and now this latest version can take over other hundreds of thousands of unpatched computers without any disruption.
For those unaware, WannaCry is an insanely fast-spreading ransomware malware that leverages a Windows SMB exploit to target a computer running on unpatched or unsupported versions of Windows and servers and then spread itself like a worm to infect other vulnerable systems in the internal network.
The SMB vulnerability has been identified as EternalBlue, a collection of hacking tools allegedly created by the NSA and then subsequently dumped by a hacking group calling itself "The Shadow Brokers" over a month ago.
"If NSA had privately disclosed the flaw used to attack hospitals when they *found* it, not when they lost it, this may not have happened" NSA whistleblower Edward Snowden says.