The UO is taking steps to protect campus from ransomware
Security wonks are calling it the biggest cyberattack ever.
The WannaCry ransomware that has spread to computers in 150 countries may end up benefiting Microsoft’s stock price. In most cases, the sum of money demanded is relatively small so it might seem easier to just pay the money and if you have backups, just restore your systems with them. That’s why it’s called ransomware. Now, another leaked NSA tool is being used by cybercriminals to create more havoc. Microsoft released a patch for the flaw in March after hackers stole the exploit from the NSA. Although, Microsoft updates have caused problems, too. Playing with fire finally caught up with the victims.
Malware requests payment in Bitcoins because they are safe, and can not be tracked by cyber security researchers or law enforcement agencies.
For those running Windows 10 or Windows Vista, Windows 7 and Windows 8.1 systems, which has automatic updates turned on, you’ll remain protected from WannaCry. However, data released from Spiceworks revealed that numerous businesses that fell victim to the attack had at least one computer using Windows XP.
The breach was first reported at Britain’s National Health Service.
In the United Kingdom, hospitals were crippled by the cyberattack, which forced operations to be canceled and ambulances to be diverted. Spain’s Telefónica and several other large companies, FedEx, Deutsche Bank, as well as the Russian Interior Ministry and Russian telecom MegaFon, Nissan and Vivo have shut down their infected systems and trying to mitigate the risk.
Anyone who hasn’t updated their Windows PC recently. “I think, realistically, people will move on pretty quickly”. “There is this stream of liability that flows from the ransomware attack”, he said. However, as of now, there is no patch for these older operating systems for the EsteemAudit vulnerability. Install Microsoft’s patch. 3. The Ransomeware is a type of malicious software which encrypts the data and blocks it from holder to use the data.
He said that intelligence agencies tended to be good and responsible stewards of the hacks and exploits they develop.
The ransomware was briefly contained with the discovery of a “kill switch” by a British researcher, but on May 14 a new version was released. The ease of stopping the attack suggests the hackers were new to this game.
Businesses could face legal claims if they failed to deliver services because of the attack, said Edward McAndrew, a data privacy lawyer at Ballard Spahr.
“We believe the recent ransomware attack could accelerate the Windows upgrade cycle for enterprises, which would drive further upside to Office 365 Commercial MAUs [monthly active users] beyond what is now factored into our estimates”, he added.
Citizens of the “Cyber City” can breathe easy for the time being as no instances of ATMs being breached by the “Wannacry” ransomware have come to light yet.