Worried the WannaCry Virus Will Affect Your Galleon NTP Server? Don’t Be…

By on

The ‘WannaCry’ malware/ransomware/virus has infected an estimated 200,000 computers across 150 countries, raising concerns that it could affect Galleon NTP servers. Your time server is safe, here’s why…

Why Your Galleon NTP Server is Safe from WannaCry

The ‘WannaCry’ ransomware affects Windows operating systems only, predominantly those that no longer receive security updates from Microsoft automatically i.e. Windows XP, Windows 8 or Windows 2003. Galleon NTP servers use a highly-customised, Linux operating system, which is unaffected by the WannaCry virus.

Here’s What We Know About the WannaCry Ransomware So Far

The WannaCry ransomware is the most severe malware attack we’ve seen in 2017. As of Monday, 15 May an estimated 200,000 computers across 150 countries were under siege by the virus. In the UK, at least 16 NHS Trusts have been ‘taken out’ by the malware. It’s rumoured that the virus originated in North Korea, but reports are unconfirmed.

The top five countries affected include:

1. United Kingdom.
2. The United States of America.
3. Russia.
4. China.
5. Spain.

What is WannaCry?

The WannaCry ransomware encrypts computer files and locks you out of your system. As the name suggests, your computer is ‘held to ransom’, with hackers demanding a bitcoin payment to unlock your computer ranging from $300 to $600. It gets into your computer as a result of you clicking on or downloading the wrong thing, in this case an email attachment.

Once activated, the virus quickly spreads through the LAN, encrypting your system’s hard disk and attempting to exploit the Server Message Block (SMB) vulnerability. This results in the spread of the malware to random computers on the Internet via TCP ports and between computers on the same network.

What Files Does WannaCry Affect?

The following are the known files that WannaCry affects:

, .jpg , .rtf , .doc , .js , .sch , .3dm , .jsp , .sh , .3ds , .key , .sldm , .3g2 , .lay , .sldm , .3gp , .lay6 , .sldx , .7z , .ldf , .slk , .accdb , .m3u , .sln , .aes , .m4u , .snt , .ai , .max , .sql , .ARC , .mdb , .sqlite3 , .asc , .mdf , .sqlitedb , .asf , .mid , .stc , .asm , .mkv , .std , .asp , .mml , .sti , .avi , .mov , .stw , .backup , .mp3 , .suo , .bak , .mp4 , .svg , .bat , .mpeg , .swf , .bmp , .mpg , .sxc , .brd , .msg , .sxd , .bz2 , .myd , .sxi , .c , .myi , .sxm , .cgm , .nef , .sxw , .class , .odb , .tar , .cmd , .odg , .tbk , .cpp , .odp , .tgz , .crt , .ods , .tif , .cs , .odt , .tiff , .csr , .onetoc2 , .txt , .csv , .ost , .uop , .db , .otg , .uot , .dbf , .otp , .vb , .dch , .ots , .vbs , .der” , .ott , .vcd , .dif , .p12 , .vdi , .dip , .PAQ , .vmdk , .djvu , .pas , .vmx , .docb , .pdf , .vob , .docm , .pem , .vsd , .docx , .pfx , .vsdx , .dot , .php , .wav , .dotm , .pl , .wb2 , .dotx , .png , .wk1 , .dwg , .pot , .wks , .edb , .potm , .wma , .eml , .potx , .wmv , .fla , .ppam , .xlc , .flv , .pps , .xlm , .frm , .ppsm , .xls , .gif , .ppsx , .xlsb , .gpg , .ppt , .xlsm , .gz , .pptm , .xlsx , .h , .pptx , .xlt , .hwp , .ps1 , .xltm , .ibd , .psd , .xltx , .iso , .pst , .xlw , .jar , .rar , .zip , .java , .raw

Renamed files have the appendage “.WNCRY”

Should You Pay the WannaCry Ransom?

Tech experts recommend that you don’t pay the ransom. According to a report published in The Guardian newspaper, meeting the demands of the hackers ‘does not guarantee the restoration of files.’

Are You Sure My Galleon NTP Server is Safe?

Galleon NTP Server
Your Galleon NTP server is safe from WannaCry.

Yes, the ransomware does not work on Linux operating systems. For your peace of mind, make sure that your computer system is updated. 

For added Galleon NTP server protection, upgrade to our new, gold support service! Call 0121 608 7230 for more information.

hello

This post was written by:

A dedicated writer for 10 years, Daniel joined Galleon Systems in 2013. Daniel assists in the production of web copy, articles, blogs, press releases and white papers, for use by Galleon Systems' marketing team. Daniel Waldron on Google+