FacebookInstagramTwitterContact

 

Launching of A.I. Diabetic Retinopathy Screening Services           >>           Honey: An Amazing Superfood With Many Health Benefits           >>           Exploring The Benefits Of FASTING For Treating COVID-19 And Vaccine Injuries           >>           Milan Wants To Ban Gelato, Pizza And Other Italian Favourites (Sort Of)           >>           Milan Wants To Ban Gelato, Pizza And Other Italian Favourites (Sort Of)           >>           Skai Jackson Reveals Where She Stands With Her Jessie Costars Today           >>           Billie Eilish Details When She Realized She Wanted Her “Face In A Vagina”           >>           Messages of Condolences           >>           Japan's SLIM Moon Lander Defies Death To Survive 3rd Frigid Lunar Night (Image)           >>           Mercedes-Benz quad-motor G-Class could be the ultimate EV off-roader           >>          

 

SHARE THIS ARTICLE




REACH US


GENERAL INQUIRY

[email protected]

 

ADVERTISING

[email protected]

 

PRESS RELEASE

[email protected]

 

HOTLINE

+673 222-0178 [Office Hour]

+673 223-6740 [Fax]

 



Upcoming Events





Prayer Times


The prayer times for Brunei-Muara and Temburong districts. For Tutong add 1 minute and for Belait add 3 minutes.


Imsak

: 05:01 AM

Subuh

: 05:11 AM

Syuruk

: 06:29 AM

Doha

: 06:51 AM

Zohor

: 12:32 PM

Asar

: 03:44 PM

Maghrib

: 06:32 PM

Isyak

: 07:42 PM

 



The Business Directory


 

 



Europe


  Home > Europe


Cyber-Attack: Europol Says It Was Unprecedented In Scale


The ransomware has been identified as WannaCry - here shown in a safe environment on a security researcher's computer

 


 May 14th, 2017  |  07:29 AM  |   2194 views

FRANCE

 

A cyber-attack that hit organisations worldwide including the UK's National Health Service was "unprecedented", Europe's police agency says.

 

Europol also warned a "complex international investigation" was required "to identify the culprits".

 

Ransomware encrypted data on at least 75,000 computers in 99 countries on Friday. Payments were demanded for access to be restored.

 

European countries, including Russia, were among the worst hit.

 

Although the spread of the malware - known as WannaCry and variants of that name - appears to have slowed, the threat is not yet over.

 

Europol said its cyber-crime team, EC3, was working closely with affected countries to "mitigate the threat and assist victims".

 

In the UK, a total of 48 National Health trusts were hit by Friday's cyber-attack, of which all but six are now back to normal, according to the Home Secretary Amber Rudd.

 

The attack left hospitals and doctors unable to access patient data, and led to the cancellation of operations and medical appointments.

 

Who else has been affected by the attack?

 

Some reports say Russia has seen more infections than any other country. Banks, the state-owned railways and a mobile phone network were hit.

 

Russia's interior ministry said 1,000 of its computers had been infected but the virus was swiftly dealt with and no sensitive data was compromised.

 

In Germany, the federal railway operator said electronic boards had been disrupted; people tweeted photos of a ticket machine.

 

France's carmaker Renault was forced to stop production at a number of sites.

 

Other targets have included:

 

Large Spanish firms - such as telecoms giant Telefonica, and utilities Iberdrola and Gas Natural

Portugal Telecom, a university computer lab in Italy, a local authority in Sweden

 

The US delivery company FedEx

 

Schools in China, and hospitals in Indonesia and South Korea

 

Coincidentally, finance ministers from the G7 group of leading industrial countries had been meeting on Friday to discuss the threat of cyber-attacks.

 

They pledged to work more closely on spotting vulnerabilities and assessing security measures.

 

How did it happen and who is behind it?

 

The malware spread quickly on Friday, with medical staff in the UK reportedly seeing computers go down "one by one".

 

NHS staff shared screenshots of the WannaCry programme, which demanded a payment of $300 (£230) in virtual currency Bitcoin to unlock the files for each computer.

 

The infections seem to be deployed via a worm - a program that spreads by itself between computers.

 

Most other malicious programs rely on humans to spread by tricking them into clicking on an attachment harbouring the attack code.

 

By contrast, once WannaCry is inside an organisation it will hunt down vulnerable machines and infect them too.

 

It is not clear who is behind the attack, but the tools used to carry it out are believed to have been developed by the US National Security Agency (NSA) to exploit a weakness found in Microsoft's Windows system.

 

This exploit - known as EternalBlue - was stolen by a group of hackers known as The Shadow Brokers, who made it freely available in April, saying it was a "protest" about US President Donald Trump.

 

A patch for the vulnerability was released by Microsoft in March, which would have automatically protected those computers with Windows Update enabled.

 

Microsoft said on Friday it would roll out the update to users of older operating systems "that no longer receive mainstream support", such Windows XP (which the NHS still largely uses), Windows 8 and Windows Server 2003.

 

The number of infections seems to be slowing after a "kill switch" appears to have been accidentally triggered by a UK-based cyber-security researcher tweeting as @MalwareTechBlog.

 

But in a BBC interview, he warned that it was only a temporary fix. "It is very important that people patch their systems now because there will be another one coming and it will not be stoppable by us," he said.

'Accidental hero' - by Chris Foxx, technology reporter

 

The security researcher known online as MalwareTech was analysing the code behind the malware on Friday night when he made his discovery.

 

He first noticed that the malware was trying to contact an unusual web address but this address was not connected to a website, because nobody had registered it.

 

So, every time the malware tried to contact the mysterious website, it failed - and then set about doing its damage.

 

MalwareTech decided to spend £8.50 ($11) and claim the web address. By owning the web address, he could also access analytical data. But he later realised that registering the web address had also stopped the malware trying to spread itself.

 

"It was actually partly accidental," he told the BBC.

 


 

Source:
courtesy of BBC NEWS

by BBC NEWS

 

If you have any stories or news that you would like to share with the global online community, please feel free to share it with us by contacting us directly at [email protected]

 

Related News


Lahad Datu Murder: Remand Of 13 Students Extende

 2024-03-30 07:57:54

Ten Dead As Navy Helicopters Collide Mid-Air In Malaysia

 2024-04-24 07:44:54

Boycotts Aren't The Only Way To Hold Companies Accountable

 2024-04-25 01:24:19