NY [U.S.], May 14 (ANI): The World's biggest cyber attack which has hit 200,000 victims in at least 150 countries threatens to create more havoc on Monday when people return to work.
Cyber security expert Dr Aleksandar Valjarevic said the best way to prevent cyber attacks was to update software.
Senior US security officials held another meeting in the White House Situation Room on Saturday, and the Federal Bureau of Investigation and the NSA were working to help mitigate damage and identify the perpetrators of the massive cyber attack, said the official, who spoke on condition of anonymity to discuss internal deliberations.
Global standards should compel countries not to stockpile or exploit software vulnerabilities, says Smith, who is also Microsoft's chief legal officer.
In the US, "the list of victims is very small", a Department of Homeland Security official tells NPR, noting that it's still relatively early in the WannaCry attack. Victims are told the payment required will double if it is not made within 48 hours.
Following the WannaCry ransomware attack, RBI has asked financial institutions to follow the instructions issued by CERT-In even as a few of them have already initiated measures to counter the attack. Since India is among the countries that have been hit hard, a decision was taken to shut down ATMs that were at risk.
Accident and emergency units in England were almost back to normal on Tuesday, the National Health Service (NHS) said, after the last restrictions put in place following the global cyber attack were lifted.
The ransomware took advantage of a flaw in Microsoft's Windows operating system.
The WannaCry "ransomware" attack, which began on May 12, disrupted hospitals, banks, shops, schools, and government agencies in more than 150 countries, attacking through vulnerabilities in older versions of Microsoft computer operating systems.
The 22-year-old cyber security researcher who tweets as [email protected]', stumbled upon a kill switch in the code of the ransomware that struck NHS hospitals across the United Kingdom on Friday.
The WannaCry attackers didn't put in a lot of work to build the SMB-based infection component either, as they simply adapted an existing exploit leaked in April by a group called the Shadow Brokers.
Secondly, people must update their systems.
Hunt denied parts of the NHS were left vulnerable to attack because they were unprepared.
Security firm BinaryEdge, which specializes in internet-wide scans, has detected more than 1 million Windows systems that have the SMB service exposed to the internet. "I do not know", Kehler said. "There is this stream of liability that flows from the ransomware attack", he said. "And this most recent attack represents a completely unintended but disconcerting link between the two most serious forms of cybersecurity threats in the world today - nation-state action and organized criminal action".