Site icon The Punching Bag Post

Everything We Know About Last Week's Global Ransomware Cyberattack

<p class&equals;"MsoNormal" style&equals;"text-align&colon; left&semi;" align&equals;"center">Cyber-security officials were busy last weekend scrambling to catch the hacker behind a massive cyber-attack that impacted dozens of countries&period; &nbsp&semi;<&sol;p>&NewLine;<p class&equals;"MsoNormal">More than 200&comma;000 computers at companies&comma; hospitals and government agencies were impacted by the ransomware worm and it is being regarded as the biggest attack of its kind&period;<&sol;p>&NewLine;<p class&equals;"MsoNormal">&ldquo&semi;The malicious software behind the onslaught appeared to exploit a vulnerability in Microsoft Windows that was supposedly identified by the National Security Agency for its own intelligence-gathering purposes and was later leaked to the internet&comma;&rdquo&semi; writes <em style&equals;"mso-bidi-font-style&colon; normal&semi;">Newsmax&period;<&sol;em> &nbsp&semi;<&sol;p>&NewLine;<p class&equals;"MsoNormal">&ldquo&semi;Britain&&num;8217&semi;s national health service fell victim&comma; its hospitals forced to close wards and emergency rooms and turn away patients&period; Russia appeared to be the hardest hit&comma; according to security experts&comma; with the country&&num;8217&semi;s Interior Ministry confirming it was struck&period;&rdquo&semi;<&sol;p>&NewLine;<p class&equals;"MsoNormal">Microsoft&rsquo&semi;s President Brad Smith addressed the cyber-attack in a blog post Sunday&period;<&sol;p>&NewLine;<p class&equals;"MsoNormal">&&num;8220&semi;This is an emerging pattern in 2017&period; We have seen vulnerabilities stored by the CIA show up on WikiLeaks&comma; and now this vulnerability stolen from the NSA has affected customers around the world&comma;&rdquo&semi; wrote Smith&period; &&num;8220&semi;This attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem&period;&rdquo&semi; &nbsp&semi;<&sol;p>&NewLine;<p class&equals;"MsoNormal">Smith places blame on the government for not seeking the appropriate help when flaws in a cyber system is dictated in an attempt to protect their top-secret espionage activities&period;<&sol;p>&NewLine;<p class&equals;"MsoNormal">He urges that governments globally should &&num;8220&semi;treat this attack as a wake-up call&&num;8221&semi; and &&num;8220&semi;consider the damage to civilians that comes from hoarding these vulnerabilities and the use of these exploits&period;&&num;8221&semi;<&sol;p>&NewLine;<p class&equals;"MsoNormal">&&num;8220&semi;For so many organizations in the same day to be hit&comma; this is unprecedented&comma;&&num;8221&semi; said Chris Wysopal of the software security firm Veracode&period; He also said the attack was likely from a criminal organization&period;<&sol;p>&NewLine;<p class&equals;"MsoNormal">The first reported attack was in Britain last Friday and it quickly spread across the world&period; &nbsp&semi;<&sol;p>&NewLine;<p class&equals;"MsoNormal">&ldquo&semi;Ransomware attacks happen every day &mdash&semi; but what makes this different is the size and boldness of the attack&comma;&rdquo&semi; said Robert Pritchard&comma; a cybersecurity expert at the&nbsp&semi;research organization Royal United Services Institute in London&period; &ldquo&semi;Despite people&rsquo&semi;s best efforts&comma; this vulnerability still exists&comma; and people will look to exploit it&period;&rdquo&semi;&nbsp&semi;<&sol;p>&NewLine;<p class&equals;"MsoNormal">The &ldquo&semi;ransomware&comma;&rdquo&semi; known as WannaCry&comma; locks up the user&rsquo&semi;s data and then issues a warning message demanding payment to unlock it&period; The ransoms started at &dollar;300 and increased to &dollar;400 after 2 hours and then to &dollar;500 and then to &dollar;600&period;<&sol;p>&NewLine;<p class&equals;"MsoNormal">&ldquo&semi;There&rsquo&semi;s no guarantee of service even if they do pay&comma;&rdquo&semi; said Becky Pinkard&comma; vice president for service delivery and intelligence operations at the cybersecurity firm Digital Shadows&period; &ldquo&semi;No one on Twitter is going to care about your complaint on this one&period;&rdquo&semi;&nbsp&semi;<&sol;p>&NewLine;<p class&equals;"MsoNormal">&ldquo&semi;The original attack lost momentum late on Friday after a security researcher took control of a server connected to the outbreak&comma; which crippled a feature that caused the malware to rapidly spread across infected networks&comma;&rdquo&semi; writes <em style&equals;"mso-bidi-font-style&colon; normal&semi;">Reuters&period;<&sol;em> &ldquo&semi;Infected computers appear to largely be out-of-date devices that organizations deemed not worth the price of upgrading or&comma; in some cases&comma; machines involved in manufacturing or hospital functions that proved too difficult to patch without possibly disrupting crucial operations&comma; security experts said&period;&rdquo&semi;&nbsp&semi;<&sol;p>&NewLine;<p class&equals;"MsoNormal">Ironically&comma; Microsoft is partially to blame&period;<&sol;p>&NewLine;<p class&equals;"MsoNormal">&ldquo&semi;Shortly after that disclosure&comma; Microsoft announced that it had already issued software &&num;8220&semi;patches&&num;8221&semi; for those holes&period; But many companies and individuals haven&&num;8217&semi;t installed the fixes yet or are using older versions of Windows that Microsoft no longer supports and didn&&num;8217&semi;t fix&comma;&rdquo&semi; writes <em style&equals;"mso-bidi-font-style&colon; normal&semi;">Newsmax&period; <&sol;em>&ldquo&semi;By Kaspersky Lab&&num;8217&semi;s count&comma; the malware struck at least 74 countries&period; In addition to Russia&comma; the biggest targets appeared to be Ukraine and India&comma; nations where it is common to find older&comma; unpatched versions of Windows in use&comma; according to the security firm&period;&rdquo&semi;<&sol;p>&NewLine;<p class&equals;"MsoNormal">The hackers cruelly attacked hospitals where doctors were forced to halt treatment for patients&period; &nbsp&semi;<&sol;p>&NewLine;<p class&equals;"MsoNormal">&&num;8220&semi;Both staff and patients were frankly pretty appalled that somebody&comma; whoever they are&comma; for commercial gain or otherwise&comma; would attack a health care organization&comma;&&num;8221&semi; said Tom Griffiths&comma; a patient at a hospital for chemotherapy&period; &&num;8220&semi;It&&num;8217&semi;s stressful enough for someone going through recovery or treatment for cancer&period;&&num;8221&semi;<&sol;p>&NewLine;<p class&equals;"MsoNormal">Cyber agencies across the world are still trying to clean-up the attack&period; It was recently reported that the Ransomware hit the first time at U&period;S&period; hospitals Wednesday and there have been fewer than 10 victims in the U&period;S&period; &nbsp&semi;<&sol;p>&NewLine;<p class&equals;"MsoNormal">President Donald Trump called for an &ldquo&semi;emergency meeting&rdquo&semi; late last week to prep for the impending cyber-attack&period;<&sol;p>&NewLine;<p class&equals;"MsoNormal">It looks like this could be the start of the attack on the U&period;S&period;<&sol;p>&NewLine;<p class&equals;"MsoNormal"><strong>Author&rsquo&semi;s note&colon;<&sol;strong> Microsoft is ironically pointing the blame at governments&comma; but since this was due to a problem with the company&rsquo&semi;s operating system&comma; perhaps they should pay for the repairs&period; But&comma; cyber security needs to be more of a priority by the government&period;<&sol;p>&NewLine;<p class&equals;"MsoNormal"><strong>Editor&&num;8217&semi;s note&colon;<&sol;strong> I still believe Microsoft bears the brunt of the responsibility for putting out software with security flaws&period;&nbsp&semi;<&sol;p>&NewLine;<p>&nbsp&semi;<&sol;p>&NewLine;

Exit mobile version