Security Minister calls Windows XP accusations 'red herrings — NHS cyber attack

Share

But he also blamed the governments.

This directive comes from the wake of Global system outage due to wannaCry Ransomware. If you know how, disable SMB service by closing TCP ports 139 and 445.

The only real security from ransomware is backups and solid security best practices.

Countries around the world braced Monday for the spread of a massive ransomware cyberattack crippling thousands of computers at banks, hospitals and government institutions. It has attacked hundreds of thousands of computers, security experts say, from hospital systems in the United Kingdom and a telecom company in Spain to universities and large companies in Asia. And while Microsoft said it had already released a security update to patch the vulnerability one month earlier, the sequence of events fed speculation that the NSA hadn't told the USA tech giant about the security risk until after it had been stolen. What's this about the NSA?

While the initial fix slowed down the progress of the virus, researchers say that two new variations have surfaced. They deliberately target those with "vulnerabilities" to be exploited - in this case, organisations running embarrassingly old versions of Microsoft Windows for which the tech company stopped issuing security updates three years ago.

India's cyber security agency Computer Emergency Response Team of India (CERT-In) has issued an alert about Wannacry Ransomeware Virus. It started on the weekend and experts are still to find a solution. "Free versions are good, but they don't protect you as much as the pay versions".

More news: Man-Made Radio Signals Have Created A Giant Bubble Around Earth
More news: Fallen officers, families left behind, remembered
More news: South Korea's Moon to send envoys to Beijing to ease tensions

Meanwhile, Reuters reported US President Donald Trump's Homeland Security Adviser, Tom Bossert, said less than $70,000 (£55,000 approx.) was paid in ransom after the cyber attack, adding that none of these payments led to any recovery of data.

Vũ Ngọc Sơn, deputy head of the anti-malware department of Bkav Corporation, the largest internet security firm in Việt Nam, said that the WannaCry ransomware's behaviour is "not new", but he believes that the use of this ransomware will not really ease up as "it can directly earn large profits for hackers".

According to Microsoft itself, numerous companies that were infected with WannaCry were either using outdated Windows OS versions or were sticking with Windows XP, which is practically considered a fossil at this point.

Because it's possible for the perpetrators to alter the code to use a different domain, MalwareTech and others warned the ransomware could continue spreading. When his website started getting hits from the malicious software, MalwareTech told ABC News he anxious he'd triggered the program to do something terrible. So, is the threat over?

Once the computer's data have been encrypted, or "locked down", a message would appear saying that the users' files are no longer accessible. Shadow Brokers said that they obtained it from a secret NSA server. Why would somebody do this?

India is also coordinating with global agencies, cleaning up the malware and conducting cyber drill regularly to foil possible cyber attacks. There are also other theories.

Share