Ransomware attack hit more than 100000 organizations, says Interpol
May 16 2017 by Anna Nguyen
He oversees everything from the Microsoft Edge browser to the design and user experience of Windows 10 and Microsoft's struggling Windows phones.
The attacks exploit a vulnerability in outdated versions of Microsoft Windows that is particularly problematic for corporations that don't automatically update their systems.
A global cyber-attack leveraging hacking tools believed to have been developed by the U.S. National Security Agency has infected tens of thousands of computers in almost 100 countries, disrupting Britain's health system and global shipper FedEx.
High percentage of users in Russia, Ukraine and China have been impacted by the attack.
The ransomware, called "WannaCry", is spread by taking advantage of a Windows vulnerability that Microsoft released a security patch for in March.
WannaCry is a form of ransomware which will lock the files of your computer and encrypts them in a way that you can not access them anymore.
Just one person in an organization who clicked on an infected attachment or bad link, would lead to all computers in a network becoming infected, said Vikram Thakur, technical director of Symantec Security Response. But those who do not are advised to deploy Microsoft Security Bulletin MS17-010.
It said the attacks had not affected the companies' services or data protection of their clients.
South Korea's presidential Blue House office said nine cases of ransomware were found in the country, but did not provide details on where the cyber attacks were discovered.
Users should regularly back up their data and ensure that security updates are installed on your computer as soon as they are released.
First credit to actually getting a sample of the malicious software code appears to go to Kafeine, a security researcher who doesn't give press interviews and only goes by his screen name, but who works for Proofpoint. Because they can be used against you. (For example, to further protect against SMBv1 attacks, customers should consider blocking legacy protocols on their networks). Customers should use vigilance when opening documents from untrusted or unknown sources. Short of paying, options for these individuals and companies are to recover data files from a backup, if available, or to live without them.
When the ransomware takes over a computer, the attackers are pretty explicit in their demands, Segura said.
But he aimed his sharpest criticisms at the USA and other nations. "We are implementing remediation steps as quickly as possible", a FedEx statement said.Telecommunications company Telefonica was among many targets in Spain.
A spokesman for the European Union's police agency, Europol, says Britain and Spain have asked for its support as they investigate the ransomware cyberattacks in those countries. The most disruptive attacks infected NHS England hospitals, where surgeries had to be rescheduled and some patients were turned away from emergency rooms.
The WannaCry attack paralysed computers running NHS hospital trusts and other major entities including Germany's national railway. Autodesk will continue to use UWP to extend their Windows Store offerings to include support for Windows Mixed Reality in Autodesk Stingray, a 3D game engine and real-time rendering software.
Thanks to a lucky find by a UK-based security researcher, yesterday's massive global ransomware attack is reported to be slowing down today.
Also, copycat variants of the malicious software behind the attacks have begun to spread, according to experts.
The "WannaCrypt" ransomware has proven to be a disaster globally.
In Russia, government agencies insisted that all attacks had been resolved.
Smith said Microsoft has the "first responsibility" to address the problem.
Global shipper FedEx Corp said some of its Windows computers were also breached.
CERT-In has been on an overdrive advising critical infrastructure agencies including banks, airports, telecom networks and stock markets to take precautions against the ransomware attack by downloading software "patches".
A United Kingdom -based security researcher who goes by the name MalwareTech put a stop to the spread of WannaCry on Friday by registering a domain name he discovered in the ransomware's code.