Lundi, 24 Juillet 2017
Latest news
Main » WannaCrypt Ransomware Windows Patch: Microsoft Tells Government To Stop Hoarding Security Vulnerabilities

WannaCrypt Ransomware Windows Patch: Microsoft Tells Government To Stop Hoarding Security Vulnerabilities

17 Mai 2017

Three days later, reports of WannaCry are now spiking in Asia.

Almost all NHS trusts were using an obsolete, 15-year-old version of Windows for which Microsoft had stopped providing security updates. It locks down all the files on an infected computer.

However, the wave of attacks has slowed down significantly.

At least 47 NHS organisations were affected with thousands of operations, tests and appointments disrupted.

Friday's attack largely hit businesses and large organizations: United Kingdom hospitals, a Spanish telecom, FedEx, the Russian Interior Ministry, and more.

Cyber security experts in the National Health Service (NHS) worked alongside the National Cyber Security Centre (NCSC), part of the GCHQ spy agency, to patch computer systems after the attack caused widespread problems on Friday, Wallace said.

The Health Secretary Jeremy Hunt was warned previous year about NHS' vulnerability to attack.

A ransomware attack called WannaCry that was first launched on 12 May and since spread around the world impacted a number of high-profile organisations globally, including NHS England in the UK.

"Outside the USA, the software tends to be older and more fragile, especially in healthcare".

India faced a malware attack previous year and 3.2 lakh debit cards were compromised.

The attack was one of the largest ransomware attacks in history.

A spokesman said: "Our understanding is that if that had been acted on it would have prevented [the malware attack]". It appears to exploit a vulnerability in Windows that, according to the Toronto Star, "was supposedly identified by the U.S".

'Because this would be nowhere near the worldwide spread and depth of attack if people had run the updates that Microsoft had provided in March'.

The attack, Smith says, "represents a completely unintended but disconcerting link between the two most serious forms of cybersecurity threats in the world today - nation-state action and organized criminal action". That amount is expected to increase.

In an advisory, RBI asked the banks to follow the dos and don'ts issued by the Indian Computer Emergency Response Team (CERT-In) to protect networks from the global ransomware attack. According to a Lakeridge spokesperson, however, the hospital's antivirus system was able to disable the ransomware.

The NHS alone continues to run 70,000 devices using Windows XP, leaving an open goal for hackers to propagate their Wanna Decryptor ransomware across the hospital network.

"In India, no reports have been formally received so far regarding this ransomware attack". Experts say the attackers have made just over $51,000.

There has been a lot of speculation that numerous affected NHS computers and devices were running Windows XP - an old operating system that is no longer supported by Microsoft. Not entirely. Computers that are already infected will remain encrypted by the ransomware.

WannaCrypt Ransomware Windows Patch: Microsoft Tells Government To Stop Hoarding Security Vulnerabilities