Beware, WannaCry cyber attack may just be the beginning

a-screenshot-of-the-warning-screen-from-a-purported-ransomware-attack-as-captured-by-a-computer-user-in-taiwan-is-seen-on-laptop-in-beijing-saturday

“We have seen vulnerabilities stored by the Central Intelligence Agency show up on WikiLeaks and now this vulnerability stolen from the NSA has affected customers around the world”.

Make sure you regularly back up your data.

“The operating systems on our computers and software downloads are managed centrally so that regular users can not download executable files from the internet without administrative rights”, he said in an email. In a matter of minutes, your files are our of reach.

Once your files are encrypted, your options are limited. Once you pay by sending the money to an anonymous recipient hiding in the “Darknet”, you get the key to use unlock your files in an hour or so.

To complicate matters further, criminals who use ransomware often ask to be paid in Bitcoin or other forms of cryptocurrencies so that payments by victims can not be traced by law enforcement and intelligence agencies.

But researchers at security firm Proofpoint said that a related attack that exploits the same vulnerability that powered WannaCry has turned more than 200,000 computers into digital currency miners.

‘There have been over 700 distress calls by customers in the last few days, following the attack that affected 150 countries.

But the software giant only sent the free security update – or patch – to users of the most recent version of the Windows 10 operating system, the report said.

Bitdefender claims that it has blocked WannaCry from the beginning.

The badly affected National Health Service said seven out of 47 trusts that were hit were still facing serious issues.

Companies such as Nissan and FedEx admitted they were hit by the attack.

On Sunday, the US software giant called on intelligence services to strike a better balance between their desire to keep software flaws secret – in order to conduct espionage and cyber warfare – and sharing those flaws with technology companies to better secure the internet (http://reut.rs/2qAOdLm).

“The attack is not focused on any particular industry but is widely spread, especially across those organisations, which are online and connected, ‘ Quick Heal Technologies” managing director Sanjay Katkar said.

Lawrence Abrams, a New York-based blogger who runs BleepingComputer.com, says many organizations don’t install security upgrades because they’re anxious about triggering bugs, or they can’t afford the downtime. This is probably why its impact is so public – because large numbers of machines at each victim organisation are being compromised.

The spread of the virus slowed over the weekend but the respite might only be brief, experts have warned.

Who is behind the attack? . This way, you will not lose it all and will be able to recover from the attack.

A spokesperson for police agency Europol said the situation in Europe “seems stable”. It says ransomware attacks were “normally criminal rather than political in nature…”

“We believe the recent ransomware attack could accelerate the Windows upgrade cycle for enterprises, which would drive further upside to Office 365 Commercial MAUs [monthly active users] beyond what is now factored into our estimates”, he added.

Wellsmore and other cybersecurity experts said the identity of the perpetrators is still unknown.

Another analyst, Dan Olds of Gabriel Consulting Group, said Smith makes a reasonable argument in saying that business must do a better job of defending themselves as well.

Research conducted by Datto shows just how high a risk small businesses are taking if they don’t employ these cybersecurity best practices. “Unfortunately for the rest of us, this thing went quite global quite quickly”.

Leave a Reply

Your email address will not be published. Required fields are marked *