Only this time, instead of mere noise and network downtime, a much more damaging payload of ransomware ground many organizations to a halt.
How is WannaCry different from other pieces of ransomware? Who started this mess? It involves blocking someone's personal data on a computer and threatening to destroy or expose it if the person does not pay a ransom. With this attack, Abrams recommends trying to recover the "shadow volume" copies some versions of Windows have.
Who are affected by WannaCry?
Businesses that failed to update Microsoft Windows-based computer systems that were hit by a massive cyber attack over the weekend could be sued over their lax cyber security, but Microsoft Corp itself enjoys strong protection from lawsuits, legal experts said.
At the same time, Smith tried to deflect criticism of Microsoft in the disaster, noting that the software giant issued a patch for the vulnerability earlier this year that many organizations ignored. It has today released a security patch for these versions to prevent further damage from the massively damaging WannaCrypt ransomware.
Experts say the spread of the virus had been stymied by a security researcher in the United Kingdom hackers have issued new versions of the virus that cyber security organizations are actively trying to counter and stamp out.
These factors help explain the mystery of why such a tiny number of victims appear to have paid ransoms into the three bitcoin accounts to which WannaCry directs victims. In short, not only are these hackers unsafe, they are potentially getting richer while playing it safe. Activating the domain worked as a kill switch for the malware.
Whatever the case, this second attack that went unnoticed for weeks proves the high degree of sophistication of such programs that were first developed by the NSA that would allow an attacker to easily install and propagate malicious software on computer networks. Even if the hackers have successfully managed to purge your data, you will be at peace knowing that you can restore it immediately. Fernandes also elaborates on how one can take cognizance of such occurrences saying: "If you receive e-mail that tells you to open links or visit a page and you do not know the user sending you the e-mail then probably you should trash the email as it is one of the safest ways to avoid an attack".
You should make multiple backups - to cloud services and using physical disk drives, at regular and frequent intervals.
Where WannaCry differs from its predecessors is in efficacy: attacking a flaw in Microsoft's Windows operating systems from Windows XP through to the latest Windows 10 - prior to a Windows 10 patch released in March, that is, which closed the hole - WannaCry has become one of the most successful malware strains in history, taking down thousands of systems from NHS computers still running Windows XP to government platforms which have not yet received the March patch. The most visible sign of this are the display information screens at airports, which run on Windows XP. However, sometimes, you can not avoid being infected. WannaCry exploited common techniques employees use to share files via a central server. Additionally, sometimes data can be recovered without paying the ransom.
It all depends on what sort of data has been encrypted. "We are working with customers to provide additional assistance as this situation evolves", the company said.
For all the worldwide chaos they have caused, the ransomware attack's perpetrators have reportedly made little more than less than $70,000, according to Tom Bossert, assistant to the president for homeland security and counterterrorism. The hackers then demand $300 in order to release control of the files. So, it isn't a ideal choice.