French researchers find way to unlock "WannaCry" without ransom

Let's review the situation here, every supported version of Windows that is running updated patches was not impacted by this vulnerability.

The malware attack, which began on Friday and has been linked by some researchers to previous hits by a North Korean-run hacking operation, leveraged a tool built by the NSA that leaked online in April, Microsoft says.

Vu Ngoc Son, deputy head of the anti-malware department of Bkav Corporation, the largest internet security firm in Vietnam, said that the WannaCry ransomware's behaviour is "not new", but he believes that the use of this ransomware will not really ease up as "it can directly earn large profits for hackers". The ransomware WannaCry encrypts information on computers and asks users to pay $300 in exchange for decryption. A new ransomware "WannaCry" is spreading widely, RBI advisory to the banks has reported.

"There is a lack of transparency in India, in-spite of a mandatory requirement for banks and listed companies to disclose cyber-attack, however, very few banks and companies do that", Tushar Ajinkya, Partner, DSK Legal, told ET.

It also expressed fear that figure of affected computers and countries is likely to grow with time especially "as people use their computers if their IT has not been updated and their security systems patched over the weekend".

WannaCry ransomware locks up files, but XP users may now have a way of recovering them but only if they haven't restarted their machine.

In a blog post on Sunday, Brad Smith, president and chief legal officer at Microsoft, noted that as cyberattacks have grown in sophistication, the government practice of hoarding malicious tools has done more harm than good. So, they analyze weaknesses in your operating system's code and keep a figurative vault of ways to hack into computers, like how the CDC stores real viruses. Governments and computer experts girded on Monday for a possible worsening of the global cyberattack that has hit more than 150 countries, as Microsoft warned against stockpiling vulnerabilities like the one at the heart of the crisis.

While earlier this week the company's president and chief legal officer Brad Smith had reportedly confirmed that the attack had used elements stolen from the NSA, the U.S. government has not given any direct comments in the matter till date.

They exploited a flawless storm of factors - the Windows hole, the ability to get ransom paid in digital currency, poor security practices - but it's unclear if the payoff, at least so far, was worth the trouble.

Friday's WannaCry Ransomware attack effectively acts as a lesson for governments and organizations worldwide to show how vulnerable they are to cybercrimes due to lack of care and responsibility in protecting their computer systems.

  • Arturo Norris