Subscribe

Subscribers to the boundless digital magazine will receive a regular digest of the most recently posted content.


Statement on WannaCry Ransomware From Aerohive

By Mike Kouri in · HiveMind Blog · May 16, 2017
"Last week the “WannaCry” ransomware worm began infecting Microsoft Windows based platforms worldwide. Partners, resellers, and customers have asked us whether Aerohive was affected by this and whether any Aerohive products are vulnerable.
No Aerohive commercial products are vulnerable. Partners, resellers and customers using Aerohive access points, switches, branch routers, or management solutions do not need to do anything to these products in response to WannaCry.
Aerohive monitors the internet-facing gateways and DNS resolvers from our various facilities around the world, and after notice of this ransomware worm propagating came out, we went back and re-examined those logs.
Aerohive’s employee community of workstations running Windows products were NOT compromised by this issue. Aerohive’s internal servers were NOT compromised by this issue.  Aerohive IT has good backup and patch management processes in place.
Aerohive’s security incident response team has been engaged since this first became public, and continues to monitor our internet-facing gateways, DNS resolvers, and workstation-to-workstation traffic in case new variants of this ransomware worm begin propagating.
If you do not believe this response adequately addresses your or your customer’s concerns, or if you have reason to believe that there are errors or omissions in this response, please do not hesitate to reach back out to security@aerohive.com or myself."
Last week the “WannaCry” ransomware worm began infecting Microsoft Windows based platforms worldwide. Partners, resellers, and customers have asked us whether Aerohive was affected by this and whether any Aerohive products are vulnerable.

No Aerohive commercial products are vulnerable. Partners, resellers and customers using Aerohive access points, switches, branch routers, or management solutions do not need to do anything to these products in response to WannaCry.

Aerohive monitors the internet-facing gateways and DNS resolvers from our various facilities around the world, and after notice of this ransomware worm propagating came out, we went back and re-examined those logs.

Aerohive’s employee community of workstations running Windows products were NOT compromised by this issue. Aerohive’s internal servers were NOT compromised by this issue. Aerohive IT has good backup and patch management processes in place.

Aerohive’s security incident response team has been engaged since this first became public, and continues to monitor our internet-facing gateways, DNS resolvers, and workstation-to-workstation traffic in case new variants of this ransomware worm begin propagating.

If you do not believe this response adequately addresses your or your customer’s concerns, or if you have reason to believe that there are errors or omissions in this response, please do not hesitate to reach back out to security@aerohive.com

Mike Kouri is a Product Manager for Aerohive. Mike has been involved in networking for 30+ years. He types slowly but drives quickly.