Ransomware attack: Some ATMs remained shut across India to escape attack

Ransomware attack: Some ATMs remained shut across India to escape attack

India Inc has also been on the vigil against "WannaCry", which has claimed victims in over 150 countries like Spanish telecom firm Telefonica, US' logistics major FedEx and Russia's interior ministry.

The flaw in Windows behind a huge cyber-attack affecting organisations around the world, including some United Kingdom hospitals, can be traced back to the US National Security Agency (NSA) - raising questions over the US government's decision to keep such flaws a secret. "This is the first one that we have seen ... that has been able to attack computers directly with this kind of success".

But suppose some real professionals secretly hacked unknown NSA zero-day exploits, and built a worm created to attack American financial systems or critical infrastructure? He says that when the NSA lost control of the software behind the cyberattack, it was like "the US military having some of its Tomahawk missiles stolen".

"The governments of the world should treat this attack as a wake-up call", Smith said.

Theft of the software was reported in April, when it was published by the Shadow Brokers, a group that has been linked to Russian Federation. Perhaps they're not really set up to take advantage of the success of their campaign so far.

Other tools from the presumed NSA toolkit published by the Shadow Brokers have also been repurposed by criminals and are being sold on underground forums, researchers said.

Questions are now being asked about the vulnerabilities caused by reliance of many parts of the NHS on ageing infrastructure and software.

A security expert in England has been hailed as an "accidental hero" for quashing the spread of the initial version of the ransomware late Friday.

BURBAGE: The kill switch allowed people to prevent the infection chain fairly quickly. We don't know the scammers' names, but we know the bitcoin addresses they're using to receive payment - just three addresses. "At that point, it will be harder to stop new variants". Privacy experts say that this mess could have been prevented if people paid attention to Microsoft's software updates.

Support for Windows XP was withdraw in April 2014 but according to Digital Health Intelligence 2015 data on NHS infrastructure as many as 20% of NHS organisations could still be making use of it, and around 90% are thought to run something on it somewhere in their organisation, often in clinical systems or imaging equipment.

So is there anyway to restore your system back to normal? The VEP was established to determine whether the government should withhold or disclose information about computer software security vulnerabilities. Companies in Asia and Europe have been warning employees to be careful when clicking on attachments and links in their emails. And remember that any account can be compromised. It appears that it only took a couple of months for malicious hackers to make good on that prediction. The worm only worked on older Windows computers which hadn't disabled legacy file-sharing. "Stay away from file extensions like ".exe", ".vbs" and ".scr".