Windows users urged to update their system as Wannacry virus continues

Windows users urged to update their system as Wannacry virus continues

Not to mention the fact that those responsible were able to borrow weaponized software code apparently created by the U.S. National Security Agency to launch the attack in the first place.

The impact of the WannaCry ransomware attack has been limited to five or six isolated instances so far and there are no reports of any substantial disruption to India's IT backbone, the government said today.

Some organizations disconnect computers as a precautionary measure.

Avast said the majority of the attacks targeted Russia, Ukraine and Taiwan.

WannaCry has infected hundreds of thousands of computers around the world in 150 countries.

The ransomware exploited a vulnerability that has been patched in updates of recent versions of Windows since March. Sure enough, WannaCry found plenty of targets. This protection center is a technical discussion focused on providing IT Security Professionals with information to help further protect systems. WannaCry exploited common techniques employees use to share files via a central server. This weekend's virus was particularly virulent, because it could spread to all other computers on a network even if just one user clicked a bad link or attachment.

"When any technique is shown to be effective, there are nearly always copycats", said Steve Grobman, chief technology officer of McAfee, a security company in Santa Clara, California. Security agencies in affected countries were racing to find out.

"After the virus breakout, the authorities immediately made arrangements for cyber security guards and domestic cyber security companies to proactively provide security services and preventive tools", the official said. But they could still linger as low-grade infections that flare up from time to time. This ransomware spreads by using a vulnerability in implementations of server message block (SMB) in Windows systems. "The current variant will make its way into anti-virus software".

The so-called WannaCry ransomware locks access to user files and demands money - in the form of the virtual currency Bitcoin - in order to decrypt them.

The damage might have been temporarily contained. A 22-year old security researcher in the United Kingdom discovered a "kill-switch" to initially stop the spread of the attack.

However, this assertion by the government goes against claims from cyber security experts.

Mark Mager, senior researcher at security firm Endgame, said it's the most prevalent and effective example of ransomware worming through networks around the world. "Talk about a wake-up call", Hypponen said.

WannaCry will eventually stop spreading as people upgrade and patch their systems.

"Whenever there is a new patch, there is a risk in applying the patch and a risk in not applying the patch", Grobman said.

While those using Macs and other non-Windows computers are not affected, they should also take precautions and install the latest security updates.

The claim that the so-called video will ruin one's mobile phone is actually part of an old hoax that initially went viral in October a year ago.