Global extortion cyberattack hits dozens of nations

Global extortion cyberattack hits dozens of nations

Germany's national railway says that it was among the organizations affected by the global cyberattack but.

A massive cyberattack brought computers to a halt on Friday and Saturday, the malware affecting over one lakh computers and systems in almost 150 nations worldwide, ranging from the UK National Health Service to a French carmaker with an alliance plant in Chennai, the German railways, the Andhra Pradesh police and entire Russian systems. The hackers then demand $300 in order to release control of the files.

Spanish authorities confirmed the ransomware is spreading through the vulnerability, called "EternalBlue", and advised people to patch.

WannaCry takes advantage of a vulnerability in Microsoft Windows. This is something Microsoft has been arguing for a while, but perhaps this recent attack will make organisations like the NSA listen harder.

Businesses, government agencies and other organizations were urged to quickly implement a patch released by Microsoft Corp. But many corporations don't automatically update their systems, because Windows updates can screw up their legacy software programs.

"For those organizations who have not yet applied the security update, we suggest you immediately deploy Microsoft Security Bulletin MS17-010". Playing with fire finally caught up with the victims. Ensure that your current defenses are properly configured to address your current risk profile and that all appropriate updates and patches have not only been installed, but are also functioning.

The biggest cyberattack the world has ever seen is still claiming victims and threatens to create even more havoc on Monday when people return to work.

Sixteen National Health Service (NHS) organizations in the United Kingdom have been hit, and some of those hospitals have canceled outpatient appointments and told people to avoid emergency departments if possible.

Megafon, a Russian telecommunications company, was also hit by the attack.

Anyone who hasn't updated their Windows PC recently.

The indiscriminate attack, which began Friday, struck banks, hospitals and state agencies in more than 150 countries, exploiting known vulnerabilities in old Microsoft computer operating systems. It is not a small attack on entire world's network. Bad guys generally target Windows far more than Apple's operating system because there are vastly more computers running Windows around the world. The other is to disable a type of software that connects computers to printers and faxes, which the virus exploits, O'Leary added.

Install Microsoft's patch. 3. Ideally offices should keep this data on a separate device and backup should be stored offline and should deploy web and emial filters on the network.

The stock market has reacted, causing shares to surge in security technology firms, and it is believed that the attack will lead to more sales of security products. None of the firms targeted indicated whether they had paid or would pay the hackers ransom.

"I will confess that I was unaware registering the domain would stop the malware until after I registered it, so initially it was accidental", wrote the researcher, who uses the Twitter name @MalwareTechBlog.

"We are working with customers to provide additional assistance as this situation evolves", the company said.

The cyberextortion attack hitting dozens of countries spread quickly and widely thanks to an unusual confluence of factors: a known and highly unsafe security hole in Microsoft Windows, tardy users who didn't apply Microsoft's March software fix, and a software design that allowed the malware to spread quickly once inside university, business and government networks.

"It is important to understand that the way these attacks work means that compromises of machines and networks that have already occurred may not yet have been detected, and that existing infections from the malware can spread within networks", said the U.K.'s National Cyber Security Centre in a statement Sunday.

Related Articles