Jeudi, 22 Juin 2017
Latest news
Main » WannaCry 2.0: Get Ready For a New Round of Ransomware Attacks

WannaCry 2.0: Get Ready For a New Round of Ransomware Attacks

16 Mai 2017

Experts say the attackers have made just over $51,000. For your system to become infected, you'll have to click on or downloading the attachment or file, which causes the program to run and infect your computer with ransomware.

Also on Monday, a major South Korean theater chain, CJ CGV, said that some 50 of its theatres had been affected by the malware, Yonhap news agency reported.

The ransomware, which has locked up over 200,000 computers in more than 150 countries, has been mainly spread by e-mail, and in China has hit schools and colleges, energy giant PetroChina's payment systems and local government.

As the world relaxes out of its brace position with few new cases announced, we've gathered together what we know about how China was affected by the WannaCry ransomware attack.

Always make sure your files are backed up.

The company responded to the attacks with a strongly worded blog post, criticizing governments for "stockpiling" information about cybersecurity vulnerabilities, and likeningthe WannaCry attack to the U.S. military "having some of its Tomahawk missiles stolen". The initial attack had started after many offices had closed Friday. The confirmation message for payment is anonymously routed through the TOR network, so that no one has any idea who is behind the attack.

Researchers remained on high alert for new variants that could lead to a fresh wave of infections. "We can surely expect more".

Reports suggest that over two lakh systems globally could have been infected by the malicious software.

"At least 45,000 computer systems in India have been infected", said one of the people cited above.

For instance, the popular Windows XP operating system extended support ended in 2014, thus it no longer actively receives security updates and vulnerability patches.

"You can point a lot of fingers, but I think given that this was not a zero-day vulnerability (for which no patch is available), the people hacked are to blame", said Robert Cattanach, a partner at the worldwide law firm Dorsey & Whitney and an expert on cybersecurity and data breaches.

When the National Security Agency lost control of the software behind the WannaCry cyberattack, it was like "the USA military having some of its Tomahawk missiles stolen", Microsoft President Brad Smith says, in a message about the malicious software that has created havoc on computer networks in more than 150 countries since Friday.

"This attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem", he said. "Repeatedly, exploits in the hands of governments have leaked into the public domain and caused widespread damage", Smith wrote in a blog post.

The main targets are however the countries in red.

Monday could bring a wave of attacks to the United States, warned Caleb Barlow, vice president of threat intelligence for IBM.

"This was not a tool developed by the NSA to hold ransom data", homeland security adviser Bossert said at Monday's White House briefing. "You're only safe if you patch ASAP".

The RBI's instructions come amid concerns that many of India's estimated 220,000 ATMs run on a relatively old version of Windows XP that makes them vulnerable to attacks by the ransomware worm called WannaCry, which shows up as a banner on the screen and seeks a ransom to access the data again.

Wedbush analyst Steve Koenig noted in a Monday report that hackers are already reworking ransomware without the kill switch. "Proper hygiene and overarching security that plugs in multiple holes is the key", added Deshpande.

The Microsoft patch will help, but installing it across large organizations will take time. Ransomware normally holds the computer in a hostage system, encrypts all your data and prevents all your apps and other software from running.

Governments around the world were bracing themselves for new attacks.

The WannaCry ransomware attack took the world by surprise, but reminded us all of fundamental lessons in cybersecurity.

In Britain fallout continued Sunday.

WannaCry 2.0: Get Ready For a New Round of Ransomware Attacks