Protecting against Sodinokibi ransomware

There has been a rise in incidents involving the ‘Sodinokibi’ ransomware, so we are advising clients to ensure their systems are updated with the latest security patches. Specialist insurer CFC, and the National Cyber Security Centre have highlighted the recent spate of incidents.

 

Managed Service Providers (MSP)

If you use an MSP, you should ensure that your system has been updated to protect against the Sodinokibi ransomware.

The Sodinokibi ransomware exploits CVE-2019-2725, a vulnerability in Oracle WebLogic Server. The ransomware is a serious cyber threat as remote code can be executed without the need for a password or username. Oracle has issued a new patch outside of its regular update cycle, and is recommending that all clients apply this as a matter of urgency.

If you are a managed service provider, you can access the latest patches from Oracle by clicking here.

 

Protecting against ransomware

The National Cyber Security Centre has published guidance on protecting your organisation against ransomware. The guidance includes an overview of ransomware and steps to help prevent a ransomware attack – please click here to read the guidance.

 

Talk to us

For more information around Cyber please speak to your Stackhouse Poland representative, fill in our ‘Contact us’ form, call 0300 660 0401 or email commercial@stackhouse.co.uk