PLEASE FORWARD THIS COMMUNICATION TO YOUR IT
Ransomware is a type of virus that executes on a user’s workstation and systematically encrypts all documents & backup files on all disk drives on the workstation, then demands a ransom payment in order to unencrypt the files.
Microsoft has identified a new vulnerability that may trigger another Ransomware outbreak similar to the WannaCry outbreak back in 2017. They have released a patch to legacy operating systems they claim to no longer support after discovering this critical vulnerability. Microsoft is warning users to patch their systems quickly to protect your practice from another WannaCry-like ransomware attack. The release of this patch suggests that Microsoft is still willing to address critical security vulnerabilities on legacy operating systems despite being in an “unsupported state” as they understand that many of these systems are still in use in settings such as healthcare. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploits this vulnerability could execute code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
We highly recommend that you apply all available critical updates using the Windows Update tool, especially if you are using any of the following Operating Systems:
- Windows 2003
- Windows XP
- Windows 7
- Windows Server 2008 R2
- Windows Server 2008
In addition to applying this patch (as communicated in response to the previous WannaCry ransomware attack), in order to protect your practice from a Ransomware attack, your IT MUST perform the following steps:
#1 NEVER map network drive letters on workstations to your EyeMD EMR Image Server directory (or parent directories). Ransomware typically only infects workstations. It scans all of your workstation’s drives looking for documents to encrypt. Mapping Network Drives to your EyeMD EMR Image Server Directory allows ransomware to encrypt documents (PDF & JPG) linked to the EMR system.
MALCONFIGURED
- R: Drive Mapped to \\SERVER\EyeMD_Data\ a shared folder of D:\EyeMD_Data\
- R: Drive Mapped to \\SERVER\IMAGES\ a shared folder of D:\EyeMD_Data\IMAGES\
- R: Drive Mapped to \\SERVER\D\ a shared folder of D:\
PROPERLY CONFIGURED
- R: Drive Mapped to \\SERVER\OCT\ a shared folder of D:\EyeMD_Data\DEVICES\OCT\
- NO drives mapped to \\SERVER\IMAGES\ a shared folder of D:\EyeMD_Data\IMAGES\
#2 Install/Update CryptoPrevent on all your workstations and servers, apply the default policies, and periodically check for updates. CryptoPrevent is a freeware software that automatically configures your operating system to block the execution of rogue applications by preventing the execution of programs in temporary directories and by using other effective techniques. It is by far the most effective way to prevent the destruction caused by Ransomware. Anti-Virus & Anti-Malware software programs can only protect you from known variants. By the time it is known, new variants emerge. Be advised that this tool may adversely affect logon scripts so please consult your IT before installing this application. https://www.eyemdemr.com/downloads/CryptoPreventSetup.exe
#3 Perform a Windows Update on all your workstations and servers. Updated systems are not susceptible to the current outbreak.
#4 Never allow users to browse the internet on a server. Servers should be inaccessible to users. Remote Desktop/Citrix servers should have “Internet Explorer Enhanced Security Configuration” enabled and should be restricted to only allow approved websites.
#5 Remote Desktop servers should never use the default TCP port of 3389. We also recommend that you do not expose Remote Desktop ports to the public internet and that you instead use a VPN to access your Remote Desktop servers.
#6 Install brute force protection software on your public facing RDP servers. We recommend RDPGuard, an affordable host-based intrusion prevention system.
#7 Never use weak passwords on any Windows User Account. Many attackers use brute force attacks with common password dictionaries to gain entry and remotely install viruses.
If you have been infected by Ransomware and cannot recover your files from a backup or using any of the tools below, the FBI recommends that you pay the ransom and report the crime to the Internet Crime Complaint Center
Cisco TALOS TeslaCrypt Decryption Tool
Kaspersky Ransomware Decryptor
If you have any questions regarding Ransomware, please help us keep our technical support lines available for EyeMD EMR related issues by directing these questions to your IT.
EyeMD EMR Healthcare Systems, Inc.