intelligence agencies, including the CIA and National Security Agency, for “stockpiling” software code that can be used by hackers. government. Brad Smith criticized U.S. Cybersecurity experts say the unknown hackers who launched this weekend’s “ransomware” attacks used a vulnerability that was exposed in NSA documents leaked online. Microsoft’s top lawyer is laying some of the blame at the feet of the U.S.
Though the ransomware continued to spread at a more subdued pace on Monday, many companies and government agencies were still struggling to recover from the first attack.
“We haven’t fully dodged this bullet at all until we’re patched against the vulnerability itself,” Kalember said.
New variants of the rapidly replicating malware were discovered Sunday. One did not include the so-called kill switch that allowed researchers to interrupt the malware’s spread Friday by diverting it to a dead end on the internet.
Carmaker Renault said one of its French plants, which employs 3,500 people, wasn’t reopening Monday as a “preventative step” while technicians deal with the aftermath of the attack.
On social media, students complained about not being able to access their work, and people in various cities said they hadn’t been able to take their driving tests over the weekend because some local traffic police systems were down.
“The numbers are still going up,” Wainwright said.
reported problems but said they said had not seriously affected their business operations. The Japan Computer Emergency Response Team Coordination Center, a non-profit group, said 2,000 computers at 600 locations in Japan were affected. Companies including Hitachi and Nissan Motor Co.
to limit vulnerability to a more powerful version of the malware — or to future versions that can’t be stopped. Experts urged organizations and companies to immediately update older Microsoft operating systems, such as Windows XP, with a patch released by Microsoft Corp.
Ciaran Martin, chief executive of the U.K.’s National Cyber Security Centre, has warned that more computers could be infected Monday as doctors’ practices re-opened after the weekend.
Just one click on an infected attachment or bad link would lead to all computers in a network becoming infected, said Vikram Thakur, technical director of Symantec Security Response.
In Britain, whose health service was among the first high-profile targets of the attack Friday, some hospitals and doctors’ offices were still struggling to recover.
Universities and other educational institutions in China were among the hardest hit, possibly because schools tend to have old computers and be slow to update operating systems and security, said Fang Xingdong, founder of ChinaLabs, an internet strategy think-tank .
Chinese state media said 29,372 institutions there had been infected along with hundreds of thousands of devices.
The attack has hit more than 200,000 victims across the world since Friday and is seen as an “escalating threat,” said Rob Wainwright, the head of Europol, Europe’s policing agency.
In Asia, where Friday’s attack occurred after business hours, thousands of new cases were reported on Monday as people came back to work.
Researchers who helped prevent the spread of the malware and cybersecurity firms worked around the clock over the weekend to monitor the situation and install the software patch.
In Indonesia, the malware locked patient files on computers in two hospitals in the capital, Jakarta, causing delays.
Railway stations, mail delivery, gas stations, hospitals, office buildings, shopping malls and government services also were affected, China’s Xinhua News Agency said, citing the Threat Intelligence Center of Qihoo 360, a Chinese internet security services company.
Britain’s National Health Service said about a fifth of NHS trusts — the regional bodies that run hospitals and clinics — were hit by the attack on Friday, leading to thousands of cancelled appointments and operations. Seven of the 47 affected trusts were still having IT problems Monday.
The movie is going to start 10 minutes after the ticket time.” (AP Photo/Lee Jin-man) The sign reads “Due to ransomware affection, we are unable to screen advertisement. A customer walks by the notice about ‘ransomware’ at CGV theater in Seoul, South Korea, Monday, May 15, 2017.
Report an error
You can change the locks but what has happened cannot be undone. If someone kidnaps your child, you may pay your ransom but there is no guarantee your child will return.” “You are dealing with a criminal,” he said. “It’s like after a robber enters your home.
“That’s what makes this more troubling than ransomware was a week ago,” Thakur said.
Change text size for the story
The full extent of the damage from the cyberattack felt in 150 countries was unclear and could worsen if more malicious variations of the online extortion scheme appear.
The initial attack, known as “WannaCry,” paralyzed computers running factories, banks, government agencies and transport systems in scores of countries, including Russia, Ukraine, Brazil, Spain, India and Japan, among others. Among those hit were Russia’s Interior Ministry and companies including Spain’s Telefonica and FedEx Corp. in the U.S.
Microsoft distributed the patch two months ago, which could have forestalled much of the attack, but in many organizations it was likely lost among the blizzard of updates and patches that large corporations and governments strain to manage.
The attack held users hostage by freezing their computers, popping up a red screen with the words, “Oops, your files have been encrypted!” and demanding money through online bitcoin payment — $300 at first, rising to $600 before it destroys files hours later.
So far, not many people have paid the ransom demanded by the malware, Europol spokesman Jan Op Gen Oorth told The Associated Press. It was too early to say who was behind the onslaught, which struck 100,000 organizations, and what their motivation was, aside from the obvious demand for money.
TOKYO — The worldwide “ransomware” cyberattack spread to thousands of more computers on Monday as people logged in at work, disrupting business, schools, hospitals and daily life, though no new large-scale breakdowns were reported.
“Right now, just about every IT department has been working all weekend rolling this out,” said Dan Wire, spokesman at Fireeye Security.
Paying ransom will not ensure any fix, said Eiichi Moriya, a cybersecurity expert and professor at Meiji University.
Ryan Kalember, senior vice-president at Proofpoint Inc., which helped stop its spread, said the version without a kill switch could spread. It was benign because it contained a flaw that prevented it from taking over computers and demanding ransom to unlock files but other more malicious ones will likely pop up.
Print this story