About Us | Contact Us
View Cart

Many School Districts Are Still Vulnerable To WannaCry

By Vigilize | Tuesday, May 28, 2019 - Leave a Comment

Years after patches were released, many systems remain vulnerable…


An article review.


While it has been over two years since the WannaCry exploit was publicly announced, a new report submitted by our own Sean Waugh says that hundreds of thousands of internet-connected machines are still vulnerable…and many of those machines belong to government agencies and other public institutions.

The investigation began when website Ars Technica began looking into a recent ransomware attack that disabled many Baltimore city government agency systems earlier this month. While working on a follow-up to that story, reporters discovered eight additional servers on the Baltimore County School District’s network that were vulnerable to the WannaCry exploit more than two years after patches became available.

When it comes to missing patches, Baltimore County isn’t alone: open internet scans have uncovered hundreds of thousands of vulnerable machines, with a disproportionate number of those belonging to schools and other government agencies. This news highlights an ongoing problem as IT departments in public agencies often deal with a lack of funding and support, often leading to vulnerabilities such as WannaCry remaining unpatched. A lack of funding can also mean older devices that require outdated, vulnerable protocols must remain in service, making mitigation more difficult.

The tools used by the reporters to find these vulnerabilities are available to the public, so it is a safe bet that criminals are also aware of them. While schools and other public institutions are far from the only vulnerable organizations, they are often targeted preferentially by criminals due to the increased likelihood that the ransom will be paid. If this wasn’t bad enough, a new round of serious vulnerabilities in Intel CPUs was announced recently, requiring another set of patches.


Original article by Sean Gallagher writing for Ars Technica.


same_strip_012513


 

Latest News
      Alternatives From 2020 Conferences The 2020 Update Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Each year as we go to various conferences throughout the Midwest ranging in scope; from small banker conferences that Dan himself moderates, to hacker conferences like Defcon.  We […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office.  
    The IBA Presents an infotex Workshop: Tech-Shop (A Virtual Workshop for Banks IT Geeks) Live Workshop Time for a workshop for the technical side of the community-bank. Time for a workshop full of command lines and configurations, acronyms we are forbidden to use around management, and even dark-web jokes. Time for a workshop where we […]
    An Analogy… …About Taking Better Notes Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . An interesting set of metaphors arose out of our efforts to improve our time management practices at infotex.  In the spirit of sound strategic planning, we as a team decided […]
    A Webinar-Movie In our current world of uncertainty there is at least one thing that is certain. Business needs to continue, and that means that it is important for managers to be able to meet with their team even if everyone is working remotely at this point. In this Webinar-Movie, Dan will compare virtual meeting […]