Cyber attack spreads to Asia as experts warn of new wave

&Tab;&Tab;<div class&equals;"wpcnt">&NewLine;&Tab;&Tab;&Tab;<div class&equals;"wpa">&NewLine;&Tab;&Tab;&Tab;&Tab;<span class&equals;"wpa-about">Advertisements<&sol;span>&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"u top&lowbar;amp">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;<amp-ad width&equals;"300" height&equals;"265"&NewLine;&Tab;&Tab; type&equals;"pubmine"&NewLine;&Tab;&Tab; data-siteid&equals;"111265417"&NewLine;&Tab;&Tab; data-section&equals;"2">&NewLine;&Tab;&Tab;<&sol;amp-ad>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;<&sol;div><p>The worldwide &&num;8220&semi;ransomware&&num;8221&semi; cyber attack has spread to thousands more computers as people across Asia logged in at work&comma; disrupting businesses&comma; schools&comma; hospitals and daily life&period; But no new large-scale outbreaks have been reported&comma; and officials in Europe said a feared second wave of infections had not materialised&period; The new infections were largely in Asia&comma; which had been closed for business when the malware first struck&period;<&sol;p>&NewLine;<p>In Britain&comma; where the health service was among the first high-profile targets of the online extortion scheme&comma; Health Secretary Jeremy Hunt said &&num;8220&semi;we have not seen a second wave of attacks…He said &&num;8220&semi;the level of criminal activity is at the lower end of the range that we had anticipated&&num;8221&semi;&period; The malware&comma; known as WannaCry&comma; paralysed computers running factories&comma; banks&comma; government agencies and transport systems&comma; hitting 200&comma;000 victims in more than 150 countries&period;<&sol;p>&NewLine;<p>Among those hit were Russia&&num;8217&semi;s Interior Ministry and companies including Spain&&num;8217&semi;s Telefonica and FedEx in the US&period; Though the spread of the ransomware slowed on Monday&comma; many companies and government agencies were still struggling to recover from the first attack&period; Carmaker Renault said one of its French plants&comma; which employs 3&comma;500 people&comma; was not reopening Monday as a &&num;8220&semi;preventative step&&num;8221&semi;&period;<&sol;p>&NewLine;<p>Britain&&num;8217&semi;s National Health Service said about a fifth of NHS trusts were hit by the attack on Friday&comma; leading to thousands of cancelled appointments and operations&period; Seven of the 47 affected trusts were still having IT problems on Monday&period;<&sol;p>&NewLine;<p>The British government denied allegations that lax cybersecurity in the financially stretched&comma; state-funded health service had helped the attack spread&period; Prime Minister Theresa May said &&num;8220&semi;warnings were given to hospital trusts&&num;8221&semi; about the Microsoft vulnerability exploited by the attackers&period;<&sol;p>&NewLine;<p>NHS Digital&comma; which oversees UK hospital cybersecurity&comma; said it sent alerts about the problem &&num;8211&semi; and a patch to fix it &&num;8211&semi; to health service staff and IT professionals last month&period; Tim Stevens&comma; a lecturer in global security at King&&num;8217&semi;s College London&comma; warned that the incident should be a wake-up call to both the public and private sectors to incorporate security into computer systems from the ground up&comma; rather than as an afterthought&period;<&sol;p>&NewLine;<p>&&num;8220&semi;This thing cannot be brushed under the carpet&comma;&&num;8221&semi; he said&period; &&num;8220&semi;It is so visible and so global&period; There is going to have to be change at levels where change can be made&period;&&num;8221&semi; In Asia&comma; where Friday&&num;8217&semi;s attack occurred after business hours&comma; thousands of new cases were reported on Monday as people came back to work&period;<&sol;p>&NewLine;<p>The Japan Computer Emergency Response Team Coordination Centre&comma; a non-profit group&comma; said 2&comma;000 computers at 600 locations in Japan were affected&period; Companies including Hitachi and Nissan Motor Co reported problems but said they had not seriously affected their operations&period;<&sol;p>&NewLine;<p>Chinese state media said 29&comma;372 institutions there had been infected along with hundreds of thousands of devices&period; Universities and other educational institutions in China were among the hardest hit&comma; possibly because schools tend to have old computers and be slow to update operating systems and security&comma; said Fang Xingdong&comma; founder of ChinaLabs&comma; an internet strategy think tank&period;<&sol;p>&NewLine;<p>On social media&comma; students complained about not being able to access their work&comma; and people in various cities said they had not been able to take their driving tests over the weekend because some local traffic police systems were down&period; Railway stations&comma; mail delivery&comma; petrol stations&comma; hospitals&comma; office buildings&comma; shopping malls and government services also were affected&comma; China&&num;8217&semi;s Xinhua News Agency said &&num;8211&semi; citing the Threat Intelligence Centre of Qihoo 360&comma; an internet security services company&period;<&sol;p>&NewLine;<p>In Indonesia&comma; the malware locked patient files on computers in two hospitals in the capital&comma; Jakarta&comma; causing delays&period; Experts urged organisations and companies to immediately update older Microsoft operating systems&comma; such as Windows XP&comma; with a patch released by Microsoft to limit vulnerability to a more powerful version of the malware &&num;8211&semi; or to future versions that cannot be stopped&period;<&sol;p>&NewLine;<p>The attack held users hostage by freezing their computers&comma; popping up a red screen with the words&comma; &&num;8220&semi;Oops&comma; your files have been encrypted&excl;&&num;8221&semi; and demanding money through online bitcoin payment &&num;8211&semi; 300 US dollars at first&comma; rising to 600 US dollars before it destroys files hours later&period; As cyber-security firms worked around the clock to monitor the situation and install a software patch&comma; new variants of the rapidly replicating malware were discovered on Sunday&period;<&sol;p>&NewLine;<p>One did not include the so-called kill switch that allowed researchers to interrupt the malware&&num;8217&semi;s spread on Friday by diverting it to a dead end on the internet&period; Ryan Kalember&comma; senior Vice President at Proofpoint &&num;8211&semi; which helped stop its spread&comma; said the version without a kill switch could spread&period;<&sol;p>&NewLine;<p>It was benign because it contained a flaw that prevented it from taking over computers and demanding ransom to unlock files but other more malicious ones will likely pop up&period; &&num;8220&semi;We haven&&num;8217&semi;t fully dodged this bullet at all until we&&num;8217&semi;re patched against the vulnerability itself&comma;&&num;8221&semi; Mr Kalember said&period;<&sol;p>&NewLine;<p>Microsoft distributed a patch two months ago that protected computers such an attack&comma; but in many organisations it was likely lost among the blizzard of updates and patches that large corporations and governments strain to manage&period;<&sol;p>&NewLine;<p>The president of Microsoft laid some of the blame at the feet of the US government&period;<br &sol;>&NewLine;Brad Smith criticised US intelligence agencies&comma; including the CIA and National Security Agency&comma; for &&num;8220&semi;stockpiling&&num;8221&semi; software code that can be used by hackers&period; Cyber-security experts say the unknown hackers who launched the attacks used a vulnerability that was exposed in NSA documents leaked online&period;<&sol;p>&NewLine;<p>Tom Bossert&comma; a homeland security adviser to President Donald Trump&comma; said &&num;8220&semi;criminals&&num;8221&semi; were responsible&comma; not the US government&period; Mr Bossert said the US has not ruled out involvement by a foreign government&comma; but that the recent ransom demands suggest a criminal network&period; Mr Bossert told ABC&&num;8217&semi;s &&num;8220&semi;Good Morning America&&num;8221&semi; that the attack is something that &&num;8220&semi;for right now&comma; we&&num;8217&semi;ve got under control&&num;8221&semi; in the United States&period;<&sol;p>&NewLine;<p>So far&comma; not many people have paid the ransom demanded by the malware&comma; Europol spokesman Jan Op Gen Oorth said&period; Eiichi Moriya&comma; a cybersecurity expert and professor at Meiji University&comma; warned that paying the ransom would not guarantee a fix&period; &&num;8220&semi;You are dealing with a criminal&comma;&&num;8221&semi; he said&period; &&num;8220&semi;It&&num;8217&semi;s like after a robber enters your home&period; You can change the locks but what has happened cannot be undone&period;&&num;8221&semi;<&sol;p>&NewLine;&Tab;&Tab;&Tab;<div style&equals;"padding-bottom&colon;15px&semi;" class&equals;"wordads-tag" data-slot-type&equals;"belowpost">&NewLine;&Tab;&Tab;&Tab;&Tab;<div id&equals;"atatags-dynamic-belowpost-68cd3c64ed54f">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;<script type&equals;"text&sol;javascript">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;window&period;getAdSnippetCallback &equals; function &lpar;&rpar; &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;if &lpar; false &equals;&equals;&equals; &lpar; window&period;isWatlV1 &quest;&quest; false &rpar; &rpar; &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&sol;&sol; Use Aditude scripts&period;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;window&period;tudeMappings &equals; window&period;tudeMappings &vert;&vert; &lbrack;&rsqb;&semi;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;window&period;tudeMappings&period;push&lpar; &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;divId&colon; 'atatags-dynamic-belowpost-68cd3c64ed54f'&comma;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;format&colon; 'belowpost'&comma;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub; &rpar;&semi;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub;&NewLine;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;if &lpar; document&period;readyState &equals;&equals;&equals; 'loading' &rpar; &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;document&period;addEventListener&lpar; 'DOMContentLoaded'&comma; window&period;getAdSnippetCallback &rpar;&semi;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub; else &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;window&period;getAdSnippetCallback&lpar;&rpar;&semi;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;<&sol;script>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;<&sol;div>


Discover more from London Glossy Post

Subscribe to get the latest posts sent to your email.

- Advertisement -
Exit mobile version