So far, UI untouched by 'WannaCry' ransomware cyberattack

Nick Mcbride
May 20, 2017

However staff beginning the working week have been told to be careful. After WannCrypt is installed, it encrypts data on the PC, then displays an extortion note demanding between $300 and $600 to unlock the files.

The second is that many businesses and government organizations are running unlicensed (pirated) copies of Windows, and are therefore reluctant to report the attack, as some analysts pointed out. That includes lost productivity and the cost of conducting forensic investigations and restoration of data, said Steve Morgan, founder and editor-in-Chief of Cybersecurity Ventures. Ransomware atttacks are expected to double this year.

It threatens to delete files within seven days if no payment is made.

Also hit were Deutsche Bahn, the Russian Central Bank, Russian Railways, Russia's Interior Ministry, Megafon and Telefónica.

The picture now appears better in Europe.

"Everything seems to be normal, so far".

But many corporations don't automatically update their systems, because Windows updates can screw up their legacy software programs. "In light of current ransomware attacks happening across the globe as well as in India, Maharashtra Cyber is collaborating with Quick Heal to help people in this crises", read a notification issued by the state police.

For the UK's National Health Service, the problem is perhaps more acute. It wasn't immediately clear to what degree nations across Asia were being affected by the attack Monday.

South Korea: Only nine ransomware cases. Not very practical for an infection involving thousands and thousands of computers. By late morning, some people were still filling out forms manually, but the hospital said 70 percent of systems were back online.

It turned out that the ransomware code was written to connect to an unregistered domain and "if the connection is not successful it ransoms the system, if it is successful, the malware exits".

This won't take long.

He added that the Cyber Swachhta Kendra - the central government's portal on information about cyber security - is being updated on regular basis since Saturday. "Rest of them were just query calls". Once the user clicks on the link or opens the document, their computer is infected and the software takes over.

The UK blogger who nearly accidentally discovered a "kill switch" that has slowed the spread of a "WannaCry" virus wreaking havoc across the globe has revealed that the world is facing a fresh cyber attack from malicious hackers who are trying to sabotage the fix.

What's behind Microsoft's "wake-up call" warning? "Since March, the government has been on high alert".

"An equivalent scenario with conventional weapons would be the U.S. military having some of its Tomahawk missiles stolen".

In fact, Microsoft has never issued security updates for software as long retired from support as Windows XP, which fell off the list more than three years ago.

Businesses that failed to update Microsoft Windows-based computer systems that were hit by a massive cyberattack over the weekend could be sued over their lax cyber security, but Microsoft Corp itself enjoys strong protection from lawsuits, legal experts said.

Whilst they advise against it, the National Cyber Policy Office allows for agencies to decide whether or not to pay on a case-by-case basis. "To keep the world safe these things have to be done".

While Microsoft said that it had already released patches for the vulnerabilities exploited by the leaked tools, another hacking group apparently used one of the leaked tools to create the WannaCry ransomware. Tough - time-consuming, expensive and complex.

In the Sunday blog post, Smith stated that the cyber attack is further evidence that cybersecurity has become a shared responsibility between tech companies and customers.

Other reports by VgToday

Discuss This Article