Lundi, 16 Juillet 2018
Latest news
Main » 'WannaCry' ransomware attack: What we know

'WannaCry' ransomware attack: What we know

16 Mai 2017

"The governments of the world must adhere in cyberspace to the same rules applied to weapons in the physical world", Brad said."The WannaCrypt attack is a wake-up call for governments to report vulnerabilities to vendors, rather than stockpile, sell, or exploit them."At the same time, Microsoft has advised people and organizations to update their systems "otherwise they're literally fighting the problems of the present with tools from the past". "WannaCry" infected computers are frozen and display a big message in red informing users, "Oops, your files have been encrypted!" and demanding about $300 in online bitcoin payment.

Every British government department's computer system is vulnerable, the former head of the civil service, Sir Bob Kerslake, says.

The broad based ransomware attack has appeared in at least eight Asian nations, a dozen countries in Europe, Turkey and the United Arab Emirates and Argentina and appears to be sweeping around the globe, researchers said.

The worldwide "ransomware" cyberattack spread to thousands more computers on Monday as people across Asia logged in at work, disrupting businesses, schools, hospitals and daily life.

The security firm Kaspersky Lab, based in Russian Federation, noted that Microsoft had repaired the software problem that allows back-door entry into its operating systems weeks before hackers published the exploit linked to the NSA, but noted: "Unfortunately it appears that many users have not yet installed the patch".

CERT-In has been on an overdrive advising critical infrastructure agencies including banks, airports, telecom networks and stock markets to take precautions against the ransomware attack by downloading software "patches". Brad Smith criticized US intelligence agencies, including the CIA and National Security Agency, for "stockpiling" software code that can be used by hackers. Hitachi said it believed the difficulties are linked to the global cyberattack but they haven't so far harmed its business operations. You should also make sure that your anti-virus software is up-to-date and that scans your computer for any malicious programs, regularly.

A spokeswoman for NHS Digital told The Guardian that "given the timing of the attack, some parts of the NHS will not have clocked there is an issue", raising fears more systems could be affected for the first time today. The statement said antivirus systems are working to destroy it. He said the situation was under control.

In China, "hundreds of thousands" of computers at almost 30,000 institutions and organizations were infected by late Saturday, according to Qihoo 360, one of China's largest providers of antivirus software.

The badly affected National Health Service said seven out of 47 trusts that were hit were still facing serious issues.

In China, the world's second-largest economy, energy giant PetroChina said payment systems at some of its petrol stations were hit, although it had been able to restore most of the systems.

"NHS Tayside takes IT security and data protection very seriously and we continually monitor and review our level of protection and invest in our IT security defences".

The spokesman added: "All hospital sites remains free of any attack".

The commission had been tasked by Hunt with identifying threats to patient data.

Home Secretary Amber Rudd is to chair a meeting of the Government's emergency Cobra committee at the Cabinet Office on Whitehall on Monday to assess progress on dealing with the attack.

'WannaCry' ransomware attack: What we know