Frenchman claims cure for WannaCry-infected computers

Windows 7 was one of the supported operating systems getting a patch about a month before Wannacry hit, so this report seemingly shows people aren't patching properly or in a timely manner, while also exposing that Microsoft still felt it necessary to issue an emergency Windows XP patch.

As of Wednesday, half of all internet addresses corrupted globally by WannaCry were located in China and Russian Federation, with 30 and 20 per cent of infections, respectively, according to data supplied by threat intelligence firm Kryptos Logic.

They are having more luck dissecting flaws that limited its spread.

Europol said on Twitter that its European Cybercrime Centre had tested the team's new tool and said it was "found to recover data in some circumstances".

An analysis of 160,000 internet-connected computers infected with WannaCry suggest 67 percent were running Windows 7 without the latest security updates, Reuters reported citing BitSight's findings. The possible targets include Microsoft's Windows 10, which was unaffected by the initial attack and is on at least 500m devices around the world.

A Microsoft spokesman defended the company's actions to CNET, claiming that users have a choice to upgrade and are warned about the security problems of using old software.

And all these cyber-crises are making investors and analysts start to like names such as BlackBerry and Microsoft even more.

Microsoft declined to comment for this story. Furthermore, infection levels have spiked again this week, according to data supplied to Reuters by threat intelligence firm Kryptos Logic.

Ransomware is a type of Malware (Malicious Software) that prevents or limits users from accessing their systems, either by locking the system's screen or by locking the users' files until a ransom is paid.

"It uses the hacking tools recently disclosed by the NSA and which have since been fixed by Microsoft in a more stealthy manner and for a different goal", said Proofpoint, who discovered the "Adylkuzz" attack.

"Security experts agree that the best protection is to be on a modern, up-to-date system that incorporates the latest defense-in-depth innovations", they continued.

"The weaknesses exploited by the virus which attacked computers all over the world and paralysed the work of many large companies do not exist in the banking group's systems", it said in response to a request for comment.

Image: Example of WannaCry ransom note. The company is crunching data to arrive at a firmer estimate it aims to release later Thursday. Wecry asked for 0.1 bitcoins to unlock files and folders.

Guinet's open-source tool is available from GitHub now, though users on other operating systems or for whom the tool does not work are advised to wipe their systems and take the resulting loss of data as a reminder to implement a proper backup procedure.

Suiche said "this is not a flawless solution, but this is so far the only workable solution to help enterprises to recover their files if they have been infected and have no back-ups". Once recovered, these prime numbers can be used to restore the files encrypted by the ransomware on infected computers.

WannaCry ransomware initially demanded a ransom of $300 in bitcoin.

"Our analysis indicates the attack, dubbed 'WannaCry, ' is initiated through an SMBv2 remote code execution in Microsoft Windows", the piece continues. After last week's WannaCry disaster, Microsoft released the update publicly.

The two researchers said they did not want to be identified discussing confidential security matters.

Nicolas Drogou, Head - Security Practice, Asia Pacific, Orange Business Services informed us what he observed in Singapore.