Monday, 11 December 2017
Latest news
Main » WannaCry Ransomware Cyberattack fails in India

WannaCry Ransomware Cyberattack fails in India

20 May 2017

One of the major problems faced was users running on pirated versions of Windows were unable to install security updates. About 30 per cent of all antivirus systems reportedly detected and destroyed the ransomware on time. "Microsoft issued an emergency patch over the weekend addressing this situation for those people". In order to decrypt the files, a user has to pay a ransom of $300 worth in bitcoins, and there is a deadline within which this has to be paid. USA and European officials did not rule out North Korea as a possible suspect in the cyberattack.

"In our research, we found that a large percentage of attacks globally by WannaCry happened in India and the country was third on the total number of attacks", said Altaf Halde, Managing Director of Kaspersky Lab, South Asia. Such a leak was also exploited and rolled out in the form of the WannaCry ransomware attack, the consequences of which we have all seen in the news. So even if the recent ransomware attack acts as a necessary wake-up call, there's still a perceived safety net. "It is therefore absolutely imperative that any organization that believes they may be affected follows and implements this guidance".

Kim calls WannaCry the world's first ransomworm-ransomware with the ability to self-propagate without user intervention or interaction.

Since increasing numbers of systems running older versions of Windows were affected, Microsoft had chose to push an emergency patch for Windows XP and Windows Server 2003, urging users to deploy the patch as soon as possible to limit the impact of WannaCry.

WannaCry Ransomware Attack Linked to North Korea, Cybersecurity Experts Say
Moreover, in addition to Symantec , researchers at Google and Kaspersky Lab confirmed the coding similarities, the Times reports . In the UK's National Health Service, which was particularly badly hit, at least 47 organisations were affected.

The WannaCry ransomware has septic over 350,000 computers across the globe in last few days.

Both hardware and software vendors often fail to account for future security flaws, and they sell firms expensive systems that eventually won't be able to receive patches. Then there are those built on top of a platform of pirated software. "There are actually legitimate reasons to wait to patch your systems".

It should be noted the WannaCry ransomware, which exploits the EternalBlue vulnerability in Microsoft's Windows OS, doesn't impact devices running on Linux or Apple's MacOS. "I don't think waiting two months is reasonable".

The one consistent thing here is that it is Microsoft Windows that is vulnerable - or, at least, out of date versions of the operating system.

DANA MILBANK: Answers from Sally Yates, more questions for White House
It also covers the post-election time period in which Trump and his transition team made a decision to appoint Flynn as national security adviser.

In an analysis posted today, Finnish cybersecurity firm F-Secure explains that China and Russian Federation are two of the countries most severely hit by WannaCry, and there's a reason why this happened: the big number of computers running pirated Windows.

Among those affected are Germany's rail system, Renault and Nissan factories, FedEx, Spanish telecom Telefónica, and Russia's central bank.

Although the US appears to have dodged a bullet, at least for now, going forward Riggi asserts that overall the healthcare industry is particularly vulnerable to ransomware and is a high-priority target for cybercriminals because of the high value of health data.

Oval Office meeting that spiralled into White House crisis
In a freaky twist on Wednesday, Russian President Vladimir Putin offered to turn over to Congress records of Trump's discussions. The person who described the Comey memo was not authorised to discuss it by name and spoke on condition of anonymity.

WannaCry Ransomware Cyberattack fails in India