Microsoft accuses NSA for 'stockpiling' software exploits regarding WannaCry ransomware outbreak

  • Microsoft accuses NSA for 'stockpiling' software exploits regarding WannaCry ransomware outbreak

Microsoft accuses NSA for 'stockpiling' software exploits regarding WannaCry ransomware outbreak

Though the spread of the ransomware slowed Monday, many companies and government agencies were still struggling to recover from the first attack.

WannaCry exploits a Windows vulnerability codenamed EternalBlue, which has been patched by Microsoft in an update deployed on March 14.

The report adds that Microsoft stopped providing support - security patches and other tools - for Windows XP in 2014.

That means an out-of-date, unsupported operating system is more popular than any version of Windows 8, any version of Mac OS X, and Linux.

The initial attack, known as "WannaCry", paralyzed computers that run Britain's hospital network, Germany's national railway and scores of other companies and government agencies worldwide in what was believed to be the biggest online extortion scheme so far.

Straight out of an episode of Mr. Robot, WannaCry (Wcry, WannaCrypt, WanaCrypt0r 2.0, or Wanna Decryptor) is a malicious software package that infects computers running Microsoft Windows. As a result, hospitals were forced to cancel operations and divert ambulances, while patient records and test results became inaccessible across England and Scotland. Russian Federation is believed to have been badly hit, with various entities such as banks, ministries, public institutions such as railways and phone operators being attacked.

Ransomware is a type of malicious software created to block access to a computer system or data until a ransom is paid.

Installing the patch is one way to secure computers against the virus. To prevent data loss users and organizations, take backup of your systems and maintain it offline so that even if your computer is infected with ransomware, you can restore your important data from your trusted backup locations.

In a blog post on Sunday, Microsoft President Brad Smith appeared to tacitly acknowledge what researchers had already widely concluded: The ransomware attack leveraged a hacking tool built by the U.S. National Security Agency that leaked online in April.

On social media, students complained about not being able to access their work, and people in various cities said they hadn't been able to take their driving tests over the weekend because some local traffic police systems were down. Install all Windows updates. 5.

Should they want to get their data back, users are asked to pay up large sums of money to get a decryption key. If you do not perform these updates, your system remains at risk, as it is more accessible to hackers. "Attackers update their software. other attackers will learn from the method and will carry out attacks". The ease of stopping the attack suggests the hackers were new to this game.

"In cases of genuine [universal resource locators] URLs, close out the email and go to the organisation's website directly through browser", it said. Microsoft has introduced a security patch to tackle the situation, and consumers across the globe have been advised to download the solution at the earliest.CERT-In today said it has not received any formal report of cyber attack on India's vital networks by the crippling global ransomware, "WannaCry".

Experts say the spread of the virus had been stymied by a security researcher in the United Kingdom hackers have issued new versions of the virus that cyber security organizations are actively trying to counter and stamp out.

There have been no victims of the cyber attack within the U.S. federal government at this time, the official said.