Ransomware

The "ransomware" cyberattack that has hit companies and governments around the world ebbed in intensity on Monday, though experts warned that new versions of the virus could emerge. Thousands more infections were reported Monday, largely in Asia, which had been closed for business when the malware first struck Friday. The cases were more contained, however, than the systemic outbreak that last week paralyzed computers running factories, banks, government agencies and transport systems around the world. Many of the 200,000 victims in more than 150 countries were still struggling to recover from the first attack of the so-called "WannaCry" virus. Carmaker Renault said one of its French plants, which employs 3,500 people, wasn't reopening Monday as a "preventative step." Britain's National Health Service said about a fifth of NHS trusts - the regional bodies that run hospitals and clinics - were hit by the attack on Friday, leading to thousands of canceled appointments and operations. Seven of the 47 affected trusts in England were still having IT problems that disrupted services Monday. Thirteen health bodies in Scotland that were hit were up and running Monday, Scottish First Minister Nicola Sturgeon said. As cybersecurity firms worked around the clock to monitor the situation and install a software patch, new variants of the rapidly replicating malware were discovered Sunday. One did not include the so-called kill switch that allowed researchers to interrupt the malware's spread Friday by diverting it to a dead end on the internet. Ryan Kalember, senior vice president at Proofpoint Inc., which helped stop its spread, said the version without a kill switch could spread. It was benign because it contained a flaw that prevented it from taking over computers and demanding ransom to unlock files but other more malicious ones will likely pop up. "We haven't fully dodged this bullet at all until we're patched against the vulnerability itself," Kalember said.

Lynne Owens, director-general of Britain's National Crime Agency, said there was no indication of a second surge of the cyberattack, "But that doesn't mean there won't be one." Tim Stevens, a lecturer in global security at King's College London, said the incident should be a wakeup call to both the public and private sectors to incorporate security into computer systems from the ground up, rather than as an afterthought.
"This thing cannot be brushed under the carpet," he said. "It is so visible and so global. There is going to have to be change at levels where change can be made." On Monday, Chinese state media said 29,372 institutions there had been infected along with hundreds of thousands of devices.
Universities and other educational institutions in the country were among the hardest hit, possibly because schools tend to have old computers and be slow to update operating systems and security.
On social media, students complained about not being able to access their work, and people in various cities said they hadn't been able to take their driving tests because some local traffic police systems were down.
Railway stations, mail delivery, gas stations, hospitals, office buildings, shopping malls and government services also were reportedly affected.

In Japan, 2,000 computers at 600 locations were reported to have been affected. Companies including Hitachi and Nissan Motor Co. reported problems but said they had not seriously affected their operations. In Indonesia, the malware locked patient files on computers in two hospitals in the capital, Jakarta, causing delays. In Britain, the government denied allegations that lax cybersecurity in the financially stretched, state-funded health service had helped the attack spread.
By
Gunjan Mittal Roy
Asst. Prof. ECE

Comments

Popular posts from this blog

Teacher As: Critical Pedagogue

ROLE CONFLICT PROBLEM AMONG WORKING WOMEN

Rights and obligations of Issuer, Participant and Beneficial owner under the Depository Act, 1996