.security / maleware help.


Instruction ‘wannacry maleware’

Enterprise Administrators

The NCSC advise the following steps be performed in order to contain the propagation of this malware:

  • Deploy patch MS17-010:


  • A new patch has been made available for legacy platforms, and is available here:


  • If it is not possible to apply this patch, disable SMBv1.  There is guidance here:


  • and/or block SMBv1 ports on network devices [UDP 137, 138 and TCP 139, 445]

If these steps are not possible, propagation can be prevented by shutting down vulnerable systems.

Work done in the security research community has prevented a number of potential compromises. To benefit:

  • Ensure that your systems can resolve and connect on TCP 80 to the domains below.



Unlike most malware infections, your IT department should not block these domains. Note that the malware is not proxy aware so a local DNS record may be required. This does not need to point to the internet, but can resolve to *any* accessible server which will accept connections on TCP 80.

Antivirus vendors are increasingly becoming able to detect and remediate this malware, therefore updating antivirus products will provide additional protection (though this will not recover any data that has already been encrypted).

The NCSC have previously published broader guidance on protecting your organisation from ransomware, which is available here.