King Khalid University
MyKKU Services
MyKKU Services

News & Events

kku

The General Directorate of Information Technology Assures and Warns Users

IT Directorate

The General Directorate of Information Technology (IT) at King Khalid University has warned users not to interact with any suspicious files or programs received via e-mail at this time because of the electronic attack of the Wannacry virus. It is a member of the Ransomware family, which encrypts the files on hacked devices, and releases files in exchange for money. The IT Directorate further noted that the program is currently being sent to some countries (million malicious messages per hour).

The Directorate pointed out that the virus works to encrypt devices for ransom money like the rest of the viruses of this family (wannacry), which began its attack yesterday in more than 76 countries using the weekend to reach as many devices as possible in the world without resistance. Moreover, the viral programs that are called (ransom programs) are different from the viral programs that attack computers such as Shimon, as these programs destroy the device only without asking for money, while the ransom programs ask for money.

For his part, the Chief Information Officer, Dr. Salem Alelyani, said, "All the ports used by the ransom virus attack have been closed, and all operating systems in the servers of King Khalid University have been updated."

How can a Ransom Virus penetrate your computer?

  • You receive a message from an anonymous mail containing malicious software
  • Lure the user to download a file so that it will inspire you as an important or personal file
  • You upload the file to your computer or personal phone
  • Virus encrypts data on your device and locks it with a password
  • The sender will issue a financial claim in return for clearing the password

How to protect your computer from Ransom Virus

  • Update your Windows system to close the gap or at least download the update to close the gap.
  • You can close the property that contains this gap as a temporary workaround