How to Prevent Ransomware Attacks

Share

He said the attack did not have any specific targets.

The Redmond giant likened the WannaCry attack to the United States military as risky as getting their missiles stolen. It says that the governments of the world should treat the WannaCry attack as "a wake-up call", to consider the "damage to civilians that comes from hoarding these vulnerabilities and the use of these exploits", and to adopt the "Digital Geneva Convention" the company first suggested in February.

Investigators are working to track down those responsible for the ransomware used on Friday, known as Wanna Decryptor or WannaCry.

Microsoft's president and top lawyer said Sunday that the ongoing cyberattacks, which experts are calling the largest in history, should be a "wake-up call" for governments - especially the U.S. Questions have been raised over Trident's vulnerability to potential cyber attacks, as the system is believed to use ageing Window's XP software - the same operating system targeted by the global ransomware attack.

More news: General Electric Company (GE): Investors Traded Stock
More news: 1st meeting of China-Philippines South China Sea consultation mechanism convened
More news: All the right-wing euphemisms for Roger Ailes' 'sins'

It blamed governments for storing data on software vulnerabilities which could then be accessed by hackers.

In India, the attack affected Andhra Pradesh Police, four manufacturing companies, two retailers, to banks, the operations of a multinational corporations and the Chennai automation facility.

The ransomware was temporarily blocked after its onslaught on Friday, but reports from several countries showed that the first series of attacks could be a start of more risky cyber intrusions. This time around, however, the tools they threaten to leak will go beyond just Windows, including exploits to do with the SWIFT banking system, mobile devices and possibly even the nuclear programs of Iran, North Korea, Russian and China. The ransomware encrypts all the files on an infected computer and demands payment in bitcoin from the administrator to be able to regain access to their files. It locked up computers running outdated versions of Windows in shops, schools, hospitals and auto factories in several countries and also demanded money from the users.

The ransomware has some indications that it was not at the level of sophistication one would expect from nation-state-sponsored hackers such as we see in Russian Federation or China. The attack froze computers at hospitals across the country, with some cancelling all routine procedures. Microsoft had already released a patch for the vulnerability back in March but many users had not updated their OS. It's crucial that customers allow their computers to automatically patch themselves when patches are issued. Many may click infected email attachments or bad links and spread the virus further.

Share