How bad was the cyberattack that hit Europe? This bad

Isaac Cain
June 28, 2017

A massive cyber-attack has affected Russian and Ukrainian companies and government agencies.

Security experts say Tuesday's cyberattack shares something in common with last month's WannaCry attack: Both spread by using digital break-in tools purportedly created by the U.S. National Security Agency and recently leaked to the web.

The government press service said Petya hit "personal computers" of some individuals but not government servers.

We confirm our company's computer network was compromised today as part of global hack.

"The WannaCry attack and now Petya clearly demonstrate that hackers do not discriminate which type of business they are targeting". Unlike WannaCry, Petya is also spread via email spam in the form of boobytrapped Office documents, according to at least one expert.

For advice from the Department of Homeland Security on how to avoid ransomware attacks, go here. (Microsoft recently released a patch meant to address this flaw.) That exploit made its way into the wild after a group calling itself The Shadow Brokers dumped what it said was a suite of NSA hacking tools on the internet in April.

A Microsoft spokesman said the company was investigating the attacks.

The wave of cyberattacks also impacted Maersk, a global cargo shipping company; Saint-Gobain, a French company producing glass and other construction materials; and British-based WPP.

More news: Man convicted of 2nd-degree murder in killing of Baby Doe

Any requests for help from DHS are confidential, McConnell says. They've assigned several writers to expand on themes in the Canadian national anthem, and my line was "We stand on guard for thee".

Merck has global locations including in Ukraine, where a new and highly virulent outbreak of malicious data-scrambling software causing mass disruption across Europe appeared to be hitting especially hard.

Some Ukrainian banks were experiencing "difficulty in servicing customers and performing banking operations" due to the attacks, the central bank said in a statement.

Computers and departure boards at Boryspil International Airport in Kiev - the largest in Ukraine - were also affected.

Pavlo Rozenko, the country's deputy prime minister, posted a picture of a darkened computer screen to Twitter, saying that the computer system at the government's headquarters has been shut down.

The statement also said that all "technological systems of the station operate in the normal mode", but that "in connection with the cyberattack, the Chernobyl nuclear power plant website is not working".

However, the radiation monitoring system at Ukraine's Chernobyl nuclear site has been taken offline after it was targeted in the attack, forcing employees to use hand-held counters to measure levels, officials said Tuesday.

Ransomware victims are always advised not to pay the ransom to get their files back, and in this case, it would be futile. This may reflect the scattergun nature of the attack, which compromises deep-pocketed victims and broke individuals alike - pricing the ransom in the thousands of dollars would mean that numerous more vulnerable victims would be unable to pay, and might also prompt the better-resourced victims to opt for a more time-consuming response like rebuilding their systems from backup, rather than paying up.

Other reports by LeisureTravelAid

Discuss This Article

FOLLOW OUR NEWSPAPER