WannaCry is your fault — Microsoft to NSA

Isaac Cain
May 20, 2017

Likewise, Reg Harnish, CEO of GreyCastle Security, comments that "it's tough to think of another ransomware situation that has been this impactful". "Ransomware is painful, but you can restore operations relatively quickly". And, if you were guessing that Windows 10 wouldn't catch this malware, you might be wrong. "To protect your computer from such malicious malwares, one should be aware of the security measures and install all necessary updates", Dinesh Yadav, superintendent of police (city) said.

Global malware Wannacry has hit India hard, infecting more than 40,000 computers and making it the third worst hit nation.

In addition, providers still are considered highly desired targets for ransomware because medical information is valuable to hackers, who can sell it for a variety of purposes, and healthcare organizations might be more willing to pay a ransom because having access to encrypted medical data is crucial to maintaining continuity of care.

The French news agency AFP is reporting that a new, second attack linked to last Friday's WannaCry attack is in progress. Here's a quick look.

Microsoft says all organizations using any version of their OS need to deploy Microsoft Security Bulletin MS17-010 immediately.

"WannaCry", as the ransomware is known, uses a Windows vulnerability originally identified by the NSA, according to security experts. This threat is detected as "Ransom:Win32/WannaCrypt". The virus has also impacted computers running Windows Vista and Windows 7 whose owners had blocked the security updates.

More news: Trump welcomes Colombia's president to the White House

"The size of the outbreak is indicative of the number of machines out there which have not been patched with security updates".

Kaspersky Labs's Global Research and Analysis team points out that WannaCry starts with a remote code execution in Microsoft Windows, taking advantage of a vulnerability dubbed "EternalBlue". But that number has nearly certainly risen as people in Asia - who had logged off for the workweek before WannaCry began spreading - have returned to work.

WannaCry has proven so nasty and ubiquitous that Microsoft took the unusual step of releasing security fixes for long-abandoned operating systems, including Windows XP and Windows Server 2003, since they are still widely used in some corners of the world and WannaCry has been a worldwide problem.

Now the group which stole these hacking weapons is called Shadow Brokers, and they are promising more chaos by releasing more of these tools to criminals.

CBRC also pledged to increase its own cyber security management and risk prevention capabilities, and guide banks to conduct monitoring, assessment, early warning and prevention for similar events. Users might not be able to do much here.

To securely plug the loopholes from being exploited by hackers and evolving into a large-scale networking disaster, it is utterly essential for the technology sector and software customers, including governments and corporate uses, to join forces to prevent this from happening. Zero-day exploits are vulnerabilities, which even the companies have not discovered yet.

Other reports by LeisureTravelAid

Discuss This Article