No substantial impact of WannaCry on Indian IT system: Secy
- Author: Zachary Reyes May 19, 2017,
May 19, 2017, 15:51
CERT-In has been on an overdrive advising critical infrastructure agencies including banks, airports, telecom networks and stock markets to take precautions against the ransomware attack by downloading software "patches".
The malware is installed on the host computer, the user locked out and the data shelved. Ransomware is a kind of malware that encrypts your information on the computer and prevents users from accessing the files on their system until a certain amount is paid. According to Kaspersky Lab, the four most affected countries were Russia, Ukraine, India and Taiwan.
But cyber security experts still think this victory is short lived.
Earlier on Monday, the country's leading security firm BKAV told Xinhua that hundreds of computers in Vietnam have been infected with WannaCry ransomeware which is spreading all over the world. Moreover, an operating system built over a decade and a half is not designed for modern hardware or sophisticated attacks that are expected in 2017.
An infection map shows not only Andhra Pradesh, but also several other spots in India under threat. The ransomware campaign was unprecedented in scale according to Europol, which estimates that around 200,000 computers were infected across 150 countries.
India was the third worst hit nation by ransomware WannaCry as more than 40,000 computers were affected even though no major corporate or bank reported disruption to their activities raising doubts whether these entities are disclosing attack at all. Install Microsoft's patch. 3.
In its postmortem of last Friday's wide-ranging ransomware attack that targeted Windows systems, Microsoft put part of the blame on the U.S. National Security Agency (NSA).
When Microsoft sells software it does so through a licensing agreement that states the company is not liable for any security breaches, said Michael Scott, a professor at Southwestern Law School. That said, in March the USA tech giant released a Windows security update for the vulnerability targeted in this hack, but many users were yet to run it.
If there's anything, Microsoft should indeed be appreciated for their response on the entire issue.
However, Microsoft was not doing a favour by "taking this highly unusual step" for its paying customers, and could be sued for neglecting its users. Even though there are ways to install the latest updates on updates on Windows which are not genuine, Microsoft is also implementing restrictions every once in a while, so depending on the release, it could be more or less hard to patch a pirated Windows copy.