Lundi, 23 Octobre 2017
Latest news
Main » Ransomware: WannaCry cyber attack may attack Indian banking system soon, says expert

Ransomware: WannaCry cyber attack may attack Indian banking system soon, says expert

19 Mai 2017

The Cyber security expert on Tuesday said that the WannaCry Ransomware is now trying to attack banking sectors. Dozens of the hospital's computer were hit by the global "ransomware" cyberattack on Saturday causing disruption to services and making patients had to wait longer while staff had to work with paper records.

"Because of the complicated nature of this campaign, and the many varieties of ransomware and malware that are available at any given time, we are working with people who have reported incidents to Cert NZ to understand their situation and what mitigations can be put in place". Currently, the perpetrators behind the attack are not known.

Internationally, China reported of 40,000 organisations being impacted, while the National Health Service of the United Kingdom was also hit badly.

Sean Pike, program VP in the security products group at IDC, a tech industry research provider, pointed that everyone has been a bit numb to attacks because it is something they hear so much about now and Microsoft benefits from that. The outdated version of Windows XP, that the ransomware managed to exploit, is used by nearly 70 per cent of Indian ATMs. Once downloaded and activated, WannaCry seems to have been able to spread to other machines with the same vulnerability. That weakness was purportedly identified and stockpiled for use by the U.S. National Security Agency; it was subsequently stolen and published on the internet. However, the NSA has neither confirmed nor denied this fact. After so many days the ransomware could totally wipe out your data. It appears that it only took a couple of months for malicious hackers to make good on that prediction.

Mr Hutchins, from Devon, has been credited with stopping the WannaCry attack from spreading across the globe by accidentally triggering a "kill switch". The researcher discovered that the web address that WannaCry was searching for had not been registered.

In a blog, he described how he stopped the spread of the virus by purchasing a web domain for pounds 8 and by redirecting it elsewhere.

But, if you suspect that your computer is infected with a malware, do not open any files. However, computers, operators and networks that didn't update their operating systems were still at risk. And, while the company did issue early fixes for its newer operating systems, patches for older Windows systems were only issued free of charge over the weekend, after the attacks began.

Above-mentioned units are asked to closely watch out and prevent WannaCry from connecting to the servers as well as update the protection systems such as IDS/IPS, Firewall. Furthermore, the risks of ransomware compound when organizations lose valuable data that has not been backed up and that can not be properly restored.

The ransomware is mainly targeting devices that run very old versions of software like Windows XP and which are unpatched. Ransomware can not encrypt what it can not access.

"The massive WannaCry attack will be a major contributor" to those losses he said in an email to CBS MoneyWatch. But many users didn't install the patch.

How To Protect Yourself From WannaCry Ransomware?

The only real security from ransomware is backups and solid security best practices. As a result - they could implode at anytime and see themselves turn into yet another company that did too little too late.

"If customers have automatic updates enabled or have installed the update, they are protected". Microsoft issued a security update in March that stops WannaCry and other malware in Windows 7. Those who didn't pay heed to the Windows XP patch are the ones who have fallen prey to the world's biggest ransomware attack.

Ransomware: WannaCry cyber attack may attack Indian banking system soon, says expert