WannaCrypt/WannaCry ransomware patch released by Microsoft

WannaCrypt/WannaCry ransomware patch released by Microsoft

IT

Centre said on Monday that there has been no report of major breach in security due to ransomware "WannaCry" except some isolated incidents.

Microsoft President Brad Smith said the cyber-attack now underway is simply the latest development in this disturbing trend. "Which we will", she said.

The most recent news concerning the massive cyber-attack knocking down critical systems used by businesses, governments and hospitals throughout the world serves as a reminder that bureaucrats are largely powerless to predict and prevent these types of attacks. Russia's Interior Ministry and companies including Spain's Telefonica, FedEx Corp.in the US and French carmaker Renault all reported troubles.

Meanwhile, automaker Renault decided not to reopen a 3,500-employee plant in France on Monday as a "preventative step".

"NCSC and NCA are working with Europol and other global partners to make sure we all collect the right evidence, which we need to do to make sure we have the right material to find out who has done this and we go after them".

"This attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem", he said.

A spokesman for Japanese conglomerate Hitachi said on Monday that the company's computer networks were "unstable", crippling its email systems. On top of that, the NSA would likely be able to claim that it is shielded from liability under the doctrine of sovereign immunity, which says that the government cannot be sued over carrying out its official duties."I doubt there can be any liability that stems back to the NSA", Dore said. "It is so visible and so global".

A FedEx spokesperson confirmed to ABC News that it was among the victims of the attack.

"Intranets in many industries and enterprises involving banking, education, electricity, energy, healthcare and transportation have been affected in different extents", CNCERT said. "Otherwise they're literally fighting the problems of the present with tools from the past".

Chinese state media said 29,372 institutions there had been infected along with hundreds of thousands of devices. Shortly after that disclosure, Microsoft announced that it had already issued software "patches", or fixes, for those holes - but many users haven't yet installed the fixes or are using older versions of Windows.

But he also placed fault in national governments.

In Indonesia, the malware locked patient files on computers in two hospitals in the capital, Jakarta, causing delays.

The health service has been criticised for using the outdated Windows XP operating system to store digital information, despite security updates for the software having been discontinued by Microsoft.

As cybersecurity firms worked around the clock to monitor the situation and install a software patch, new variants of the rapidly replicating malware were discovered Sunday.

Ryan Kalember, senior vice-president at Proofpoint Inc., which helped stop its spread, said the version without a kill switch could spread.

Although the spread of WannaCry has slowed, more computers could be affected as a new working week begins.

"We haven't fully dodged this bullet at all until we're patched against the vulnerability itself", Kalember said.

The president of Microsoft laid some of the blame at the feet of the US government.

The malicious program "WannaCrypt", which demands a payment of Bitcoin to unlock an infected system, was part of a stockpile of exploits stolen from the National Security Agency earlier this year. Cybersecurity experts say the unknown hackers who launched the attacks used a vulnerability that was exposed in NSA documents leaked online.

  • Terrell Bush