'WannaCry' ransomware attack: What we know

Share
'WannaCry' ransomware attack: What we know

Once it infects one computer within a network, it can spread to all the computers in that network "within seconds", said Israel Levy, the CEO of the cybersecurity firm Bufferzone.

The virus has locked people and companies out of their computers, leaving payment of $300 ransom as the only option to get back the access. That's why it's called ransomware. Before Friday's attack, Microsoft had made fixes for older systems, such as 2001′s Windows XP, available only to those who paid extra for extended technical support.

In March, we released a security update which addresses the vulnerability that these attacks are exploiting. If you must run legacy software then look for ways to isolate it from external threats. The company even slammed the United States' National Security Agency for not sharing the information about the vulnerability soon enough with Microsoft officials.

Consumers are also at risk. Microsoft even issued a rare patch to Windows XP to help defend computers against the cyberattack, and has criticsed the U.S. government for stockpiling code around vulnerabilities.

Computers in more than 150 countries have been hit by what experts are calling an unprecedented mass cyberattack using ransomware.

According to a spokesman for Barts Health NHS Trust in London, they were experiencing a "major IT disruption" and delays at all four of its hospitals, and the ambulances were being diverted to nearby hospitals.

It is the largest ransomware attack observed in history.

After installing the security update, the next best thing you can do to protect yourself against future attacks is pretty simple. "Software updates and security patches are pushed to us as needed so that we are using the most current approved versions of software on our computers".

Mikko Hypponen, chief research officer at the Helsinki-based cybersecurity company F-Secure, said ransomware attacks like WannaCry are "not going to be the norm".

That quick thinking may have saved governments and companies millions of dollars and slowed the outbreak before USA -based computers were more widely infected. Install Microsoft's patch. 3.

Secondly, update your systems as frequently as possible in case you're not accustomed to automatic Windows updates. Use the latest anti-virus and anti-malware software and monitor consistently to prevent infection.

The hackers remain anonymous for now, but it appears that they are amateurs.

A 22-year-old British researcher identified online as "MalwareTech" saw the findings and activated a "kill switch" for the attack, slowing its spread.

According to a New York Times report, North Korea may be behind this recent attack.

Experts and governments alike warn against ceding to the demands and Wainwright said few victims so far had been paying up. Those systems can be infected remotely from other network-attached computers that were already compromised.

The biggest cyberattack the world has ever seen is still claiming victims and threatens to create even more havoc on Monday when people return to work.

Microsoft has sent sounded out a warning to establishments worldwide, urging them to treat this malware attack as a "wake-up call", but hasn't taken responsibility for exposing hundreds of thousands of users to extortion by cyber attackers such as ShadowBrokers.

Share

Advertisement

Related Posts

© 2015 Emnnews. All Rights reserved.