WannaCry Ransomware: Know How To Protect Yourself From The Unexpected Attack

  • WannaCry Ransomware: Know How To Protect Yourself From The Unexpected Attack

WannaCry Ransomware: Know How To Protect Yourself From The Unexpected Attack

"Yet, when a serious vulnerability is discovered in software, many companies respond slowly or say it's not their problem". The malware locked down computers and threatened businesses and individuals of wiping out files from systems in a week's time if the victim did not pay a ransom between 300 to 600 dollars.

Microsoft President Brad Smith sharply criticized the USA government on Sunday for "stockpiling" software flaws that it often can not protect, citing recent leaks of both NSA and Central Intelligence Agency hacking tools.

"As cybercriminals become more sophisticated, there is simply no way for customers to protect themselves against threats unless they update their systems", he stated. In some cases, such as the National Health Service in the United Kingdom, the targeted institutions were slow to upgrade their systems with the latest protections, leaving older computer systems open to attack.

On Monday, a Microsoft spokesman declined to comment beyond Smith's post.

So how to deal with a future of more common global cyber attacks doesn't just call into question the ability of various governments to cooperate - it calls into question whether the global economy will ever agree on a functional intellectual property rights regime that poorer countries and powerful global corporations alike can live with. "The goal of Microsoft and every other software developer is to create the most secure systems they can design".

Microsoft agreed to help patch older systems, such as Windows XP, that the company had stopped supporting with security updates in an apparent bid to prompt customers to purchase newer Microsoft operating systems.

"People have extremely short memories when it comes to this", said Jan Dawson, an analyst with Jackdaw Research.

He added that the Cyber Swachhta Kendra - government's portal on information about cyber security - is being updated on regular basis since Saturday.

Microsoft and its peers shouldn't count on the NSA to hand over information about vulnerabilities; spies will be spies.

Who are all affected?

Since then, the company has poured billions of dollars into security initiatives, employing more than 3,500 engineers dedicated to security. Along with other cyber powers such as China and Russian Federation, it operates teams of specialists who identify security flaws that can be used for cyber spying or cyber attacks. Most ATMs were running fine, there could be some which may not have updated Microsoft's Windows operating system, sources said.

Still, it was Microsoft that wrote the exploitable software to begin with.

Infrastructure hacking is exactly what has a security and surveillance expert concerned. Up till now, the global cyber-attack has affected more than 200,000 victims in 150 countries, which also includes India.

The business interruption and extortion coverage options in cyber policies are increasingly being taken up by policyholders as the incidence of ransomware increase, said Brian J. Dusek, an attorney at McCullough Campbell & Lane L.L.P.in Chicago who specializes in cyber risk and professional liability coverage.

A researcher from Google posted on Twitter that an early version of WannaCrypt from February shared some of the same programming code as malicious software used by the Lazarus Group, the alleged North Korean government hackers behind the destructive attack on Sony Corp in 2014 and the theft of US$81 million from a Bangladesh central bank account at the New York Fed previous year. According to ProofPoint, the main motive for ransomware is profit.

"We have reached a turning point where it is not sustainable for governments to think they can retain vulnerabilities for very long", said Ari Schwartz, who oversaw technology security issues at the National Security Council during the Obama administration.