"WANNACRY" RANSOMEWARE ATTACK STYMIES GLOBAL PCS
Ransomware WannaCry last week ripped through hundreds of thousands of PCs in what is considered the largest ever cyber-extortion scheme.
According to reports, the malicious software spread to at least 300,000 devices globally, including the UK’s National Health Service (NHS).
The attack left hospitals crippled as operations were canceled, ambulances diverted, and patient records made unavailable in England and Scotland, The Guardian reported.
“It is important to understand that the way these attacks work means that compromises of machines and networks that have already occurred may not yet have been detected,” Britain’s National Cyber Security Center (NCSC) said in a statement.
“Existing infections from the malware can spread within networks,” the agency continued, adding that “as a new working week begins,” folks should be aware that additional cases of ransomware may emerge, “possibly at a significant scale.”
WannaCry uses an exploit known as EternalBlue—developed by the US National Security Agency (NSA) and leaked online last year by a group calling itself the Shadow Brokers.
The serious strain of ransomware escaped last week after unsuspecting victims reportedly downloaded a compressed zip file attached to an email, releasing WannaCry onto their PC. Hackers then demanded a $300 ransom (double that after 72 hours) to unlock the device and all saved files.
Among those affected are Germany’s rail system, Renault and Nissan factories, FedEx, Spanish telecom Telefónica, and Russia’s central bank.
“We know already that there have been attempts to attack organizations beyond the National Health Service,” the NCSC said. “It is therefore absolutely imperative that any organization that believes they may be affected follows and implements this guidance.”
Businesses and home users can follow similar steps to ensure safety, notably keeping security software patches and antivirus software up to date. Those running Windows 10 are safe from harm; WannaCry targets older versions of Microsoft’s OS, including Vista, Windows 7, and Windows 8.1.
“Most importantly for ransomware, backup the data that matters to you,” NCSC advised. “Because you can’t be held for ransom for data you hold somewhere else.”
No comments:
Post a Comment