Mardi, 22 Mai 2018
Latest news
Main » So far, UI untouched by 'WannaCry' ransomware cyberattack

So far, UI untouched by 'WannaCry' ransomware cyberattack

19 Mai 2017

It comes after more than 200,000 victims in around 150 countries were infected by ransomware that originated in the United Kingdom and Spain before spreading around the world. This ransomware attack, which demands users shell out $300 to $600 worth of Bitcoins to regain access to their systems, spread across Asia after rocking Europe this weekend. Those systems can be infected remotely from other network-attached computers that were already compromised.

Shares in firms that provide cybersecurity services jumped on the prospect of companies and governments spending more money on defenses, led by Israel's Cyren Ltd and USfirm FireEye Inc. "Software updates and security patches are pushed to us as needed so that we are using the most current approved versions of software on our computers". He says Chinese security companies have been offering their help.

(In China, that country's love of pirated software, which typically doesn't receive updates, contributed to WannaCry's virulent spread there on Monday).

The main element of the ransomware, though, is a window with a bunch of information about what has happened, links about Bitcoin, and the mechanism for making payment.

The recent cyberattack targeted government, businesses and hospitals. "However, Hitachi and others have mostly only reported loss of email and other secondary functionalities".

Other Spanish firms to be hit included power firm Iberdrola and utility provider Gas Natural.

Once again, it appears hospital systems have escaped the true nightmare scenario - wide scale injuries or deaths resulting from misbehaving technology.

Despite Microsoft's claims that the attack lies on NSA hands, several news outlets, including The Independent and The Inquirer, blamed Microsoft. "This teaches us how something can wreak havoc without attacking the traditionally designated critical infrastructure like a power grid", Choudhary said.

If you're facing a ransom demand and locked out of your files, law enforcement and cybersecurity experts discourage paying ransoms because it gives incentives to hackers and pays for their future attacks.

The identity of whoever deployed the software remains unknown.

The WannaCry ransomware cyber-attack has hit more than 200,000 computers in 150 countries since Friday, Europol says.

"An equivalent scenario with conventional weapons would be the USA military having some of its Tomahawk missiles stolen", Smith said. On the plus side this outbreak does have people patching, so we have that going for us. If that ransom isn't paid in 72 hours, the price could double. He said governments need to consider the damage that comes from hoarding these vulnerabilities.

It turned out that the ransomware code was written to connect to an unregistered domain and "if the connection is not successful it ransoms the system, if it is successful, the malware exits".

A FedEx spokesperson confirmed to ABC News that it was among the victims of the attack.

Microsoft itself is unlikely to face legal trouble over the flaw in Windows being exploited by WannaCry, according to legal experts.

"Code for exploiting that bug, which is known as "Eternal Blue" in Microsoft's Windows operating system, was released on the internet in March and Microsoft released patches last month", Wu noted.

Back up your computer and store the safety version in the cloud or on a drive that is not connected to your computer.

Keep security software up to date.

Continually train and remind employees and network users to be aware of and on the lookout for suspicious emails and to "think before they click" on any attachments.

We know, Windows 10 isn't flawless, and it has a bunch of issues that - understandably - make some users nervous. This will make it much easier to spot potentially malicious files.

So far, UI untouched by 'WannaCry' ransomware cyberattack