Next global cyber-attack likely on Monday

Xavier Trudeau
Mai 18, 2017

"Malware that penetrates the perimeter and then spreads inside the network tends to be quite successful", said Johannes Ullrich, director of the Internet Storm Center at the SANS Institute. Most stations had recovered. He said the software attacking a vulnerability had been incorporated with other software and delivered in a way to cause "infection, encryption and locking".

But there will be other vulnerabilities to come, and not all of them will have fixes for older systems.

Broadcaster NTV reported 600 companies and 2,000 computers in Japan had been affected.

But as Asia woke up to the working week on Monday, leading Chinese security-software provider Qihoo 360 said "hundreds of thousands" of computers in the country were hit at almost 30,000 institutions including government agencies. However, bank ATMs across the country may not face the wrath of WannaCry that also locks computers and demands a ransom.

Chinese media reported Sunday that students at several universities were hit, blocking access to their thesis papers and dissertation presentations.

Microsoft's top lawyer is laying some of the blame for Friday's massive cyberattack at the feet of the USA government. The security flaw that hackers used to launch the attacks Friday was made public after information was stolen from the U.S. National Security Agency, which routinely searches for flaws in software and builds tools to exploit them.

A spokesman said: "Like many organisations around the world, some Nissan entities were recently targeted by a ransomware attack".

Microsoft said the situation was "painful" and that it was taking "all possible actions to protect our customers".

The unprecedented cyber ransomware attack continues to spread across the globe, even as computer security experts are working non-stop to limit the damage caused.

The US Department of Homeland Security, in a statement, encouraged people to update their operating systems, CNN reported.

However, a hacker could change the code to remove the domain and try the ransomware attack again.

Ryan Kalember, senior vice president at Proofpoint Inc., says that millions of devices could be vulnerable if they haven't applied security patches over the weekend.

The kill switch also couldn't help those already infected. The initial attack had started after many offices had closed Friday.

In Spain, major companies including telecommunications firm Telefonica have been infected. Hackers are threatening the users that if they do not pay within the set deadline they will delete all the files on the users' systems, however, governments are asking the citizens not to pay the ransom, as it would encourage the hackers to go for more such attacks.

James Clapper told ABC's "This Week" on Sunday that he expects similar attacks to become a growing problem in the future.

It is believed to be the biggest online extortion recorded. The malware is also a worm that can spread over LAN networks. Once the whole system is locked down the user can only access two files - instructions on what to do next and the virus program.

It was too early to say who was behind the onslaught, which struck 100,000 organizations, and what their motivation was, aside from the obvious demand for money.

Hundreds of hospitals and clinics in the British National Health Service were infected on Friday, forcing them to send patients to other facilities.

Why did this ransomware spread so much faster than others?

Security wonks are calling it the biggest cyberattack ever. A large cyberattack crippled computer systems at.

"In this case, when we registered it, it turned out to be a kill switch", Salim Neino, CEO of Kryptos Logic, which employs MalwareTech as a cybersecurity researcher, told ABC News.

Organizations around the world have spent the weekend trying to recover after being hit by a virus that seeks to seize control of computers until victims pay a ransom.

Security experts said his move bought precious time for organizations seeking to block the attacks.

D'autres rapports CampDesrEcrues

Discuter de cet article