Medicine

Ransomware attack hit 200000 victims in 150 countries

Ransomware attack hit 200000 victims in 150 countries”

"The EternalBlue exploit is part of a bigger leak called "Lost In Translation" that packs multiple vulnerabilities ranging from simple annoyances to extremely severe ones", Bogdan Botezatu, senior e-threat analyst at Bitdefender, said by email.

A GLOBAL cyber attack that has struck computers across Europe and Asia is believed to have infected its first Australian business, the federal government says. It locks down all the files on an infected computer. But it appears to be "low-level" stuff, Eisen said Saturday, given the amount of ransom demanded - $300 at first, rising to $600 before it destroys files hours later. That's why it's called ransomware.

The tool used by hackers to take down systems worldwide is a variant of the WannaCry tool, also known as WCry or Wana Decryptor.

Prime Minister Malcolm Turnbull's cyber security adviser, Alastair MacGibbon, said on Sunday there had been one confirmed incident in Australia, but warned it was likely more computer systems would eventually be hit.

Security officials in Britain urged organizations to protect themselves by updating their security software fixes, running anti-virus software and backing up data elsewhere. Playing with fire finally caught up with the victims.

But consumers also can not be complacent, Smith warned.

Consumers and businesses who have updated to the most recent Microsoft Windows software are protected from WannaCry.

Over the weekend, the ransomware has hit systems in more than 150 countries, including Russian Federation and the United Kingdom, in one of the most widespread cyber attacks in history.

Railway stations, mail delivery, gas stations, hospitals, office buildings, shopping malls and government services also were affected, China's Xinhua News Agency said, citing the Threat Intelligence Center of Qihoo 360, a Chinese internet security services company.

On Friday, Russia's interior and emergencies ministries, as well as its biggest bank, Sberbank, said they were targeted.

Anyone who hasn't updated their Windows PC recently.

Computer users should patch their machines with updates from Microsoft, especially those using older versions of operating systems such as Windows XP. These other programs are in various stages of development and try to masquerade as WannaCry, even though some of them are not even capable of encrypting files at this point.

The attack therefore spread faster than previous, smaller-scale ransomware attacks. The fact that it only works against old Windows systems shows that it is specifically directed against civilian infrastructure, such as public sector networks that are often administered cheaply, by overworked and less qualified information technology professionals, on obsolete hardware, with software that won't run on Windows 10. Although Microsoft released fixes in March, the attackers counted on many organizations not getting around to applying those fixes. Organisations seeking to take risk management steps related to this campaign should install the latest Windows patches. An unidentified young cybersecurity researcher claimed to help halt WannaCry's spread by activating a so-called "kill switch".

New versions of the worm were expected, and the extent of the damage from Friday's attack was still unclear.

"With the right approach, it won't be something that people will have to worry about", Microsoft's founder Bill Gates said of cyber attacks back in October on the BBC.

This directive comes from the wake of Global system outage due to wannaCry Ransomware. However, a hacker could rewrite the code to omit the kill switch and start trying to infect new machines with a new version of it.

The ransomware attack was particularly malicious, because if just one person in an organization clicked on an infected attachment or bad link, all the computers in a network would be infected, said Vikram Thakur, technical director of Symantec Security Response.



Like this

Latest




Recommended