Hacker - WannaCry decrypting tools and mitigation Microsoft actions checklist

Today I would like to make a quickly zero point about Wanna Cry Malware diffusion, tools and theoretical info availability.
  1. Decrypting tools: Here it is a web site that permit, after to be sure to have successfully cleanup your device, to download and launch decrypting tool.
    It is important to read, as first step, how-to guide.
    On website there is a section where upload .txt files and encrypted files to check if a decrypting solution is available.
  2. GandCrab: Against this new ransomware, that appeared this January 2018, at the end of February security firm Bitdefender, Police, and Europol gained access to the GandCrab Ransomware's Command & Control servers.
    This action permitted to recover some of the victim's decryption keys and create below tool:
    Download: BitDefender GandCrab Decrypting tool
    REMARK: v2 appeared and decription tool is not available for this kind of virus.
  3. Here it is an excellent Microsoft powerpoint.
  4. Here it is Microsoft webinar "Protect Against Rapid Cyberattacks (Petya, WannaCrypt, and similar", this explain:
    -  How these attacks work
    - Microsoft's road map of prescriptive recommendations
    - Q&A / Gather feedback on your top challenges with adopting these recommendations.
  5. Interesting Microsoft link "Securing Privileges Article"
  6. From this Microsoft Article I would like to highlight on actions to mitigate risks with some photos:



I am intending to, month by month, add updates and new articles, stay tuned then.

About Wannacry you could review these previously blog posts.

Previously blog posts: