Lundi, 29 Mai 2017
Latest news
Main » WannaCry ransomeware threat: Agencies on alert in Himachal Pradesh

WannaCry ransomeware threat: Agencies on alert in Himachal Pradesh

19 Mai 2017

It said "computer hardware and software that can no longer be supported should be replaced as a matter of urgency".

A computer science lecturer in Shivamogga reportedly fell prey to WannaCry.

This story doesn't feel too surprising. IT experts were working on these systems. There were also reports from Bengal that the virus had infected around 10 standalone computers in the offices of the West Bengal State Electricity Distribution Company in three blocks - Belda, Datan and Narayangarh in West Midnapore district.

The only real security from ransomware is backups and solid security best practices.

The Vietnam Computer Emergency Response Team (VNCERT), under the Ministry of Information and Communications, has issued warnings as well as offered protection measures to all users to guard against the ransomware and its variations, which target Microsoft Windows - an operating system that is widely used in Vietnam, especially the outdated Windows XP. "It is very hard to hold software manufacturers accountable for flaws in their products", said Abdo.

The ransomware works by exploiting a vulnerability in Microsoft Windows.

"If [the NSA] had privately disclosed the flaw used to attack hospitals when they found it, not when they lost it, this may not have happened". U.S. government said that its agencies were not affected in any way by the attack but issued an advisory to inform Federal Bureau of Investigation if any such incident is occurred. This is exactly what happened within the NHS.

In China, more than 29,000 institutions were infected with reports suggesting that around 30,000 institutions had been infected along with hundreds of thousands of devices, Xinhua reported. If a more recent version of Windows is running on the computer and it stays up-to-date, it should not be vulnerable to the current attack or WannaCry.

You should make multiple backups - to cloud services and using physical disk drives, at regular and frequent intervals.

In the wake of the ransomware attack triggered by WannaCry virus, IT firms in Bengaluru are racing against time to updating their security systems. This exploit is not a fire drill and WannaCry is just the exploits payload. Around 200,000 victims in 150 countries have been affected, according to European Union police force Europol, many of them businesses including major corporations such as Nissan, FedEx and Hitachi. Instead, it takes advantage of a security hole in most Windows versions to automatically execute itself on the victim's PC.

There are a number of tools publicly available to limit the spread and the impact of further cyber security attacks. But the inefficiency of the payment model makes Hickey wonder whether the hackers were really after money.

"This means that as a new working week begins it is likely, in the United Kingdom and elsewhere, that further cases of ransomware may come to light, possibly at a significant scale". Post- "critical alert" against the WannaCry attack - Ransomware virus has forced the city-based companies, government and law enforcement agencies to update their antivirus systems and upgrade their systems to protect the data from the virus. "They could even install the fix/updates themselves, so that nobody else would be able to use the same vulnerability", he said.

Daniels offered a few more ways to improve the system: "In the future, I think we need to arrive at some metrics for measuring how severe and exploitable a particular vulnerability is".

In case of any ransomware attack, report Action Fraud.

But some other technology industry executives said privately that it reflected a widely held view in Silicon Valley that the USA government is too willing to jeopardize internet security in order to preserve offensive cyber capabilities. Getting people to understand how is still a serious challenge.

WannaCry ransomeware threat: Agencies on alert in Himachal Pradesh