Published: Sat, May 20, 2017
Hi-Tech | By Grace Becker

Wannacry cyber attack compromised Russian banks in isolated cases

Wannacry cyber attack compromised Russian banks in isolated cases

"In order to work, your computer must not have been rebooted after being infected".

If possible, only use supported operating systems and other software.

Yet, Bossert claimed in Monday's press briefing that if organizations follow the mitigation advice published by the Department of Homeland Security, the Federal Bureau of Investigation and Microsoft-and have patched their systems-they will be "protected against all these variants". In addition to this, another controversial pricing issue is that Microsoft is now charging users for additional security in the latest Windows 10 version. Because yes, the Wannacrypt worm is based on an NSA exploit codenamed "EternalBlue", which was recently released on the Internet by a hacker group called the Shadow Brokers. That hole has been patched in newer versions of Windows, though not all companies and individuals have installed the patches.

Users of older software, such as Windows XP, had to pay hefty fees for technical support, it added. As the article states: "With very few exceptions-including an emergency patch after the first wave of WannaCry infections and expensive, specialized service contracts-Microsoft no longer provides any security support for the OS".

Microsoft, despite knowing the vulnerabilities present in its PC software, chose to withhold the release of the security patch for a certain section of clients, which were running older (ex: Windows Vista & Windows XP) versions on their company systems, according to Financial Times. The company "doubled" its share price in one year, said chief security strategist Laurent Heslault. Infection levels spiked again in both countries this week and remained high through Thursday, according to data supplied to Reuters by threat intelligence firm Kryptos Logic.

Dutch police call on citizens to report cyberattacks following global ransomware attack
The Japan Computer Emergency Response Team Co-ordination Centre said 2,000 computers at 600 companies in Japan had been affected. In Russia, where a wide array of systems came under attack, officials said services had been restored or the virus contained.

Of course, with anti-virus software, the same principle applies: Make sure to keep the anti-virus app up-to-date, too, so it blocks the latest emerging malware. There are government-backed initiatives to help small companies with cybersecurity, such as the UK's Cyber Essentials, but these don't have the scale to reach everyone or even identify and help those most in need.

Since the WannaCry ransomware attack began in Europe on Friday it has locked thousands of computers in more than 150 countries. Around 200,000 victims in 150 countries have been affected, according to European Union police force Europol, many of them businesses including major corporations such as Nissan, FedEx and Hitachi.

However, a bug in WannaCry code means the attackers can not use unique bitcoin addresses to track payments, security researchers at Symantec found this week.

The particularly nasty computer program dubbed "WannaCry" that attacked hospitals, businesses and government agencies around the world this past weekend was like a cybercrime highlight reel, a compilation of by-now familiar elements - conscience-free cybercriminals, an obscure vulnerability in Microsoft Windows, older and ill-maintained corporate computer networks and computer users tricked into opening booby-trapped email attachments - that played out on an epic scale.

These factors help explain the mystery of why such a tiny number of victims appear to have paid ransoms into the three bitcoin accounts to which WannaCry directs victims.

Like this: