What we currently know about the global cyberattack

Share

In what one of the most significant cyberattacks ever recorded, computer systems from the U.K.to Russia, Brazil and the US were hit beginning Friday by malicious software that exploited a vulnerability in Microsoft's Windows operating system. The longer you wait, the more you have to pay. Bkav's free device will help users to check whether their computer have been affected by Wanna Crypt which is extremely risky as it is capable of stealing information and decrypting the entire system that has been infected.

Those running Windows 10, 8.1, 7, Vista SP2 or Windows Server 2008 SP2 or later are already protected from the ransomware, which had infected many systems worldwide.

The global ransomware plague started infecting computers on Friday, abusing an exploit discovered by the NSA that was leaked to the public by the Shadow Brokers hacker group. Once you pay by sending the money to an anonymous recipient hiding in the "Darknet", you get the key to use unlock your files in an hour or so.

The company on Friday said it had added additional protection against the specific malware, and was working with affected customers. Spain's communications giant Telefonica, utility provider Gas Natural and power firm Iberdrola were hit, as well as the Russian Interior Ministry and FedEx operations in the United States.

How did the attack spread so fast? Why it is more unsafe is because the strain does not include kill switch domain at all like WannaCry did. Moreover, the risk of getting affected is still high as employees might come back to work and click on infected links or email attachments that might further spread the ransomware software.

More news: Trump suggests he may cancel all White House press briefings
More news: Legalising cannabis will raise £1bn a year in tax, say Lib Dems
More news: Parker hurt as Spurs draw level

Ahead of the attack, Microsoft released a security update that fixes the exploited flaw on now supported Windows operating systems.

Who is behind the attack? .

Smith said the malicious WannaCrypt software "were drawn from the exploits stolen from the National Security Agency".

Backups Enable Ransomware Recovery: In ransomware situations, backups (Eze Vault) are the only way to recover files from an attack. "Remarkably few payments had so far been made in response to this attack". "We can surely expect more". They just happen to hit the motherlode.

The editorial goes on to accuse the USA of acting as a roadblock to efforts aimed at combating cybercrime.

Share