“In Singapore, it didn’t affect many companies but government institutions were openly breached and attacked”.
“Users of infected computers found their data held hostage with unbreakable encryption”.
The Japan Computer Emergency Response Team Coordination Center told the Associated Press that 2,000 computers in Japan were reported affected so far.
The ransomware attack is dubbed as one of the most prolific cyberattacks in the history of the internet. The IT ministry has asked the respective bodies to secure their systems against WannaCry and ensure the digital payments are not affected during this torrid at risk period.
Over the weekend, Europol officials said that some 200,000 computers have been hit by the malware. Moreover, the list will add new members as well as more devices and machines will be attacked by this malware in the future.
For instance, if we take the case of the hospital systems held hostage in United Kingdom, they’re more likely to pay up in order to safeguard their patient’s information that has been encrypted by the attacker than a teenager with photos and contacts to lose – which otherwise, in all likeliness – is also backed up on cloud. Payment is demanded in Bitcoin cryptocurrency.
It’s largely a question of resources and attention.
Organizations must wake up to the modern realities of these attacks, assume they’re a target, and prepare accordingly. In reality, doing that may be more hard than it sounds, either because of corporate cultures that don’t prioritize security or because of a lack of funding to upgrade to the latest and greatest.
In fact, David Powner, director of IT at the Government Accountability Office, says some federal agencies pay programmers more to learn outdated languages, just to keep old systems functioning.
“They’ve proven that these are highly effective tools in their possession, so people are going to be very interested in purchasing this, especially other criminals”, Sean Dillon, a senior security analyst at RiskSense said.
So what has been the impact of WannaCry on Indian companies?
WannaCry flooded computers around the world with ransomware, locking up those networks until a specified amount was paid.
Ransomware attacks do not necessarily involve unauthorized acquisition or access to the data by the attacker, but they may nonetheless warrant consideration for legal notifications to law enforcement and regulators, or notice to business partners or customers as may be required under contract.
To be clear, I am not suggesting that the Shadow Brokers built and launched this ransomware worm.
The bad news is, you might be stuck with paying or wiping your machine and starting over from a clean install.
“Anytime something like this happens, we wonder if this will be the tipping point”.
Who’s being targeted for blame?
It said it was set to sell access to previously undisclosed vulnerabilities, known as zero-days, that could be used to attack Microsoft Corp’s latest software system, Windows 10.
What about Apple and Android devices?
Global malware Wannacry has so far infected more than 40,000 computers in India. “As cybercriminals become more sophisticated, there is simply no way for customers to protect themselves against threats unless they update their systems”.
It’s unclear who the attackers are, but we do somewhat know about the origins of the ransomware.
While the sequence of actions leading up to the worldwide hack are still obscure, it is maintained that the NSA warned Microsoft its hacking tool had been stolen and the company issued a patch in March.
One hopes that WannaCrypt has taught at least a few computer users an important lesson about software security. “An equivalent scenario with conventional weapons would be the USA military having some of its Tomahawk missiles stolen”.