Malware fight is not over, warns Europol

Toni Houston
May 16, 2017

Worldwide investigators hunted Saturday for those behind an unprecedented cyber-attack that affected systems in dozens of countries, including at banks, hospitals and government agencies, as security experts sought to contain the fallout.

"The ransomware also spreads through malicious attachments to emails", it said.

Security experts said his move bought precious time for organizations seeking to block the attacks. The game's website was working Sunday, but the game has been shut down until the owners can recover from the attack. That move, which cost just $10.69, redirected the attacks to the server of Kryptos Logic, the security company where he works.

In a blog post Brad Smith wrote that after a vulnerability was identified a security update was released for newer Windows systems, but "many remained unpatched globally".

Fellow security researcher Darien Huss, from tech firm Proofpoint, echoed MalwareTech's view. "There is a real squeeze on spending - and IT security isn't seen as sexy compared to things like incubators and kidney machines", he says.

Many workers had already logged off their computers on Friday when the malware began spreading, wreaking havoc on the U.K.'s hospital network, Germany's railway system, and companies around the world.

"At the moment we are in the face of an escalating threat, the numbers are going up, I am anxious about how the numbers will continue to grow when people go to work and turn their machines on Monday morning". Dozens of countries were hit with a huge cyberextortion attack Friday that locked up computers and held users' files for ransom at a multitude of hospitals, companies and government agencies.

Security officials in Britain urged organizations to protect themselves from ransomware by updating their security software fixes, running anti-virus software and backing up data elsewhere.

Industry reports indicate Russia, Taiwan, Ukraine and Britain were among the countries hit hardest, and more hacking reports can be expected when offices reopen for the new workweek Monday or, in some parts of the world, Sunday.

"And we've got to make sure, at a departmental level, government level, departmental heads. that they're taking the necessary steps", he told Sky.

This is the first warning most people and companies receive - when they try to call and use a document or file. A 22-year old security researcher in the United Kingdom discovered a "kill-switch" to initially stop the spread of the attack. That cheap move redirected the attacks to MalwareTech's server, which operates as a "sinkhole" to keep malware from escaping.

But how much do individuals need to worry about their personal computers being targeted?

But the kill switch couldn't help those already infected. "They're processing a lot of sensitive data", he said. Security researchers said the ransomware was created on code from NSA malware strains that were recently leaked by the mysterious Shadow Brokers hacker group.

But Mr MacGibbon said the ransomware could be adapted by the criminals and was not willing to say the threat of compromise was over. "But there's clearly some culpability on the part of the US intelligence services".

"They told us there was a problem".

That said, some people often pay the cash just to retrieve important files.

"Obviously, they want those tools in order to spy on people of interest, on other countries, to conduct surveillance", Cluley said.

Other reports by Ligue1talk

Discuss This Article