The cyber attack that spread rapidly around the globe was stifled when a security researcher disabled a key mechanism used by the worm to spread, but experts said the hackers were likely to return as many computers remain at risk.
Hackers can still gain easy access to personal computers that lack a security update issued in March by Microsoft Corp. to fix the vulnerability in its Windows operating system. The company, which had labeled the March patch as “critical,” said it was now providing a security update for all Windows customers.
The malware, using a technique purportedly stolen from the U.S. National Security Agency, stopped care Friday at hospitals across the U.K., affected Russia’s Ministry of Interior and infected company computer systems in countries from Eastern Europe to the U.S. and Asia. While most organizations won’t suffer as much as the U.K. health-care facilities, the incident renewed the debate about the risk of governments stockpiling flaws in commercial technology and using them for hacking attacks.
In the U.K., 45 organizations in the National Health Service were affected, Home Secretary Amber Rudd said Saturday, and hospitals in London, North West England and Central England urged people with non-emergency conditions to stay away as technicians tried to stop the spread of the malicious software.
“There will be lessons to learn from what appears to be the biggest criminal cyber attack in history,” Rudd said in response to a letter from opposition Labour Party spokesman Jonathan Ashworth. “Our immediate priority as a government is to disrupt the attack, restore affected services as soon as possible, and establish who was behind it.”
Last year an acute-care hospital in Hollywood paid $17,000 in bitcoin to an extortionist who hijacked its computer systems and forced doctors and staff to revert to pen and paper for record-keeping.
Hospitals are also fertile ground for identity thieves because of their often-lax security policies. Bloomberg Businessweek wrote in 2015 about a spate of malware infections at hospitals where radiological machines, blood-gas analyzers and other devices were compromised and used to siphon off the personal data of patients.
Business Targets
Other victims were most likely small and medium-sized businesses. Some larger organizations, such as Spain’s Telefonica SA and FedEx Corp. were also infected. A spokesman for Telefonica said the hack affected some employees at its headquarters, but the Spanish phone company is attacked frequently and the impact of Friday’s incident wasn’t major. FedEx said it was “experiencing interference,” the Associated Press reported.
French carmaker Renault SA halted production at some factories to stop the virus from spreading, a spokesman said Saturday, while Nissan Motor Co.’s U.K. car plant in Sunderland, in northeast England, was affected without causing any major impact on business, an official said.
In Germany, rail operator Deutsche Bahn faced “technical disruptions” on electronic displays at train stations, but travel was unaffected, the company said in a statement on its website. Newspaper reports showed images of a ransomware message blocking train details.
Russia’s Interior Ministry, with oversight of the police forces, said about “1,000 computers were infected,” which it described as less than 1 percent of the total, according to its website.
While any sized company could be vulnerable, many large organizations with robust security departments would have prioritized the update that Microsoft released in March and wouldn’t be vulnerable to Friday’s attack.
Users Tricked
Ransomware is a particularly stubborn problem because victims are often tricked into allowing the malicious software to run on their computers, and the encryption happens too fast for security software to catch it. Some security expects calculate that ransomware may bring in as much as $1 billion a year in revenue for the attackers.
More than 75,000 computers in 99 countries were compromised in Friday’s attack, with a heavy concentration of infections in Russia and Ukraine, according to Dutch security company Avast Software BV. Russia’s Interior Ministry, with oversees the country’s police forces, said “around 1,000 computers were infected,” which it described as less than 1 percent of the total, the New York Times reported. The ministry said technicians had stopped the attack and were updating the department’s “antivirus defense systems,” according to the Times.
March Patch
Microsoft cited its March security update and said it had added detection and protection against the new malware after it was reported. “We are working with customers to provide additional assistance,” the company said in a blog posting.
The company took the “highly unusual step” of releasing free security patches for unsupported out-of-date operating systems, including Windows XP and Windows Server 2003.
The attack was apparently halted in the afternoon in the U.K. when a researcher took control of an Internet domain that acted as a kill switch for the worm’s propagation, according to Ars Technica.
“I will confess that I was unaware registering the domain would stop the malware until after I registered it, so initially it was accidental,” wrote the researcher, who uses the Twitter name @MalwareTechBlog. “So long as the domain isn’t revoked, this particular strain will no longer cause harm, but patch your systems ASAP as they will try again.”
There is a high-probability that Russian-language cyber criminals were behind the attack, said Aleks Gostev, chief cyber security expert for Kaspersky Lab.
“Ransomware is traditionally their topic,” he said. “The geography of attacks that hit post-Soviet Union most also suggests that.”
–With assistance from Stepan Kravchenko, Ksenia Galouchko, Robert Hutton and Jack Sidders.
Related:
- Update: Ransomware Hack of UK Hospitals Part of Global Cyber Attack
- Experts Expect Simultaneous Cyber Attacks on Multiple Firms: Survey
- High-Profile Cyber Attacks Drive Growth of Cyber Crime 热点黑料
- Confusing, Costly Cyber Policies Create Obstacles to Market Growth: Deloitte
- Level of Cyber Risk Management for Many Firms Is ‘Unsustainable’: Swiss Re
- UK Opens National Cyber Security Centre; MGA Sciemus Comments
- Europe’s Firms Face Potential ‘Perfect Storm’ of Cyber Threats: MMC Report
- 2017 Cyber Risks to Intensify as Hackers Become More Cunning: Report
- Cyber Market Hampered by Insurability Challenges: Geneva Assoc. Report
- Urgent Action Needed to Tackle Systemic Threat of Cyber Risk: Marsh & TheCityUK
- Hospitals Warned on Surge in Ransomware Attacks
- Public-Private Catastrophe Scheme in UK Would Help Mitigate Cyber-9/11: Study
Was this article valuable?
Here are more articles you may enjoy.