22 million WannaCry ransomware attack attempts blocked by Symantec
Experts are suspecting that the next wave of attacks will be subjected to the banking sector. “We have seen vulnerabilities stored by the Central Intelligence Agency show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world”, Smith wrote.
If you don’t recognize the email address, don’t open the file. In a matter of minutes, your files are our of reach. Once you pay by sending the money to an anonymous recipient hiding in the “Darknet”, you get the key to use unlock your files in an hour or so. The hackers behind WannaCry only accept ransom paid via BitCoin, a digital currency that ensures that the transaction can not be traced.
KitGuru Says: With cyber attacks becoming more prevalent, it is increasingly important to stay on top of software updates. The “WannaCry” ransomware swiftly spread across 200,000 computers in 150 countries, causing Microsoft to issue an emergency patch for those still running outdated Windows XP systems.
Since the attack, Microsoft has responded to the seriousness of the situation by issuing security updates to older versions of Windows that are normally unsupported.
But then, the patches won’t do any good for machines that have already been hit.
Bitdefender claims that it has blocked WannaCry from the beginning.
By Friday afternoon, 16 National Health Service (NHS) facilities reported that they were affected by the cyberattack.
Smith said the attack provided graphic evidence about “the degree to which cybersecurity has become a shared responsibility between tech companies and customers”. Previous year too, around 3.2 lakh debit cards were compromised in the country due to a malware attack that affected ATM machines of Hitachi during three months of May, June and July of 2016. Users are also advised to back up valuable data regularly, either to cloud services or to another disk drives, an not click on suspicious links or attached files.
How did the attack spread so fast?
A spokeperson from Bitdefender explained that the ransomware can move itself around networks, once it has found a way in.
A Cybercpace Administration of China official said on Monday, that although the virus is still spreading, it has slowed.
Microsoft said that while the systems running on Windows 10 were not targeted, the company had released a security patch Windows XP, Windows 8 and Windows Server 2003 on Friday.
“The fact that so many computers remained vulnerable two months after the release of a patch illustrates this aspect”, Smith wrote Sunday. Now, Microsoft is putting the blame for this attack directly on the governments who hid security flaws for their own benefit.
As of now the attacker and the motive behind the attack are unknown. Further, software built over a decade ago is not designed for modern hardware or sophisticated attacks that we frequently see today.
Wellsmore and other cybersecurity experts said the identity of the perpetrators is still unknown.
“I was actually panicking because because one of my analysts made a mistake and they had said by registering the url we had started the infection”, the unnamed researcher told ABC News.