Governments, businesses worldwide brace for new ransomware attacks

The malware spread through phishing attacks, malicious emails and infected attachments, encrypting every file it can on a computer and then posting a landing page demanding a $300 ransom payment in Bitcoin in order for the files to be unlocked.

Smith's blog post did not address another factor in the ransomware's spread, one that hints at the difficulty of uniting against a hacking attack: Users of pirated Microsoft software are unable to download the security patch, forcing them to fend for themselves or rely on a third-party source for a solution.

Firstly, we would like to mention the Windows versions that are by far and large under the assault of WannaCry. But individuals with personal computers running Windows operating systems should also take precautions.

According to Matthew Hickey, founder of the security firm Hacker House, Friday's attack is not surprising, and it shows many organizations do not apply updates in a timely fashion. However, MS17-010 is a patch for newer operating systems as well, such as Windows 7 and Windows 8.1, plus Windows Server 2008, Windows Server 2012 and even Windows Server 2016. Install Microsoft's patch. 3.

The ransomware is spreading through email, and is evolving rapidly to attack more computers, including Apple devices.

Here's the link to the official update page by Microsoft, which includes patches for most of the versions.

The NCA says: "Victims of fraud should report it to Action Fraud".

An equally important thing is to back up all the important data on your computer.

Check Point Threat Intelligence is warning people infected by WannaCry not to pay its ransom. A Twitter bot tracking the payments made to WannaCrypt now has the value paid for ransoms at $55,800. In other words, paying may not guarantee you can again access your files. Prof Alan Woodward of the University of Surrey doubts if someone would return your contact request, considering the amount of attention they are getting from all corners.

Brad Smith, the president and chief legal officer of the United States technology giant Microsoft, considers that the recent cyberattacks, registered worldwide, should serve as an alarm signal for different governments, which should take urgent actions to maintain cybersecurity.

The governments of the world should treat the cyber attack as a "wake-up call", the president of Microsoft has said. While the hackers used aspects of stolen NSA data to launch the attack, there is no evidence to show the attacks were initiated by US intelligence.

"An equivalent scenario with conventional weapons would be the US military having some of its Tomahawk missiles stolen, "Microsoft President Brad Smith said in a blog".

  • Arturo Norris