No substantial impact of WannaCry on Indian IT system: Secy
It is a malicious piece of software, and it blocks access to computers until you pay the money. Around 200,000 victims in 150 countries have been affected, according to European Union police force Europol, many of them businesses including major corporations such as Nissan, FedEx and Hitachi. Though it didn’t have any significant impact in India, but the cyber security experts are working round the clock from last two days to protect the corporate clients.
The computer malware has spread across 150 countries and takes over users’ files with a demand of $300 to restore them.
WannaCry has so far spread around business networks via a vulnerability in Windows that most home users will have patched, or will not be at risk from anyway. In 2016, thousands of computers in 42 separate NHS trusts in England were reported to be still running on Windows XP. He says that when the NSA lost control of the software behind the cyberattack, it was like “the US military having some of its Tomahawk missiles stolen”. According to various resources, the attack affected many National Health Service (NHS) hospitals in England and Scotland, and up to 70,000 devices – including computers, MRI scanners, blood-storage refrigerators and theatre equipment – may have been affected.
The ransomware exploited a security hole in Windows XP, a 15-year-old operating system that Microsoft stopped updating in 2014. However, a second wave of the attack that many feared would be carried out with mutated versions of the malware did not happen.
French carmaker Renault said its plant in the northern town of Douai would not reopen on Monday as it dealt with the cyber-attack.
Mumbai (Maharashtra) May 17: The Maharashtra Anti-Terrorism Squad (ATS) on Wednesday denied any hacking or ransomware virus attack to its website. They say it will continue to spread in a modified form. So far, not many people have paid the ransom demanded by the malware, Europol spokesman Jan Op Gen Oorth told The Associated Press. The reason appears to be related to the fact that the original exploit was based on machines that came out before Windows 10.
The Japan Computer Emergency Response Team Coordination Center, a nonprofit group providing support in computer attacks, said 2,000 computers at 600 locations in Japan were reported affected. The precedent may impact other software sellers too.
However, for those unfortunate enough to have been hit – be that at work or within an institution – it is probably best to assume that access to any files that were not backed up on a drive disconnected from your computer have now been lost forever.
How should businesses respond to ransomware attacks?
Governments “need to take a different approach and adhere in cyberspace to the same rules applied to weapons in the physical world”, Smith says, urging agencies to “consider the damage to civilians that comes from hoarding these vulnerabilities and the use of these exploits”.