Ransomware Attacks Ravage Computer Networks In Dozens Of Countries – NPR

Each orange dot is a unique infection by WannaCrypt ransomware as recorded by MalwareTech.com

Courtesy of malwaretech.com

First, there were reports of Spain’s largest telecom being hit with pop-up windows demanding a $300 ransom to access files. Then at least 16 hospitals in England’s National Health Service were affected, locking doctors and nurses out of patients’ records unless they paid up. Now comes word that networks around the world are under attack Friday.

“Currently, we have recorded more than 45,000 attacks of the WannaCry ransomware in 74 countries around the world, mostly in Russia,” cyber security firm Kaspersky says.

The attacks are being blamed on a piece of malware called WCry, WannaCry, or Wana Decryptor, that’s been tracked in large-scale attacks in Europe and Asia — particularly Russia and China — and a scattering of attacks in the U.S. and South America, according to a map on the Malware Tech site.

Victims of the attack are confronted with a pop-up window that tells them their files are now encrypted and that they need to send $300 via the bitcoin cryptocurrency.

“You can decrypt some of your files for free,” reads the message, which we’re seeing today in a variety of languages. “But if you want to decrypt all your files, you need to pay. You only have 3 days to submit the payment. After that the price will be doubled.”

The window includes a countdown clock that threatens the files will be lost permanently in seven days.

Wana Decryptor exploits a Windows flaw that was patched in Microsoft’s Security Bulletin MS17-010 in March. But on machines that haven’t been updated or patched, the malicious code encrypts all of an infected machine’s files — and then spreads itself.

“Infection of a single computer can end up compromising the entire corporate network,” Spain’s National Cryptologic Center says.

The malware is alleged to have been leaked or stolen from the National Security Agency, as the Bleeping Computer site reports.

“Activity from this ransomware family was almost inexistent prior to today’s sudden explosion when the number of victims skyrocketed in a few hours,” the site’s Catalin Cimpanu writes.

In the U.S., the Computer Emergency Readiness Team, or CERT, says it has “received multiple reports of ransomware infections in several countries around the world,” without identifying those countries.

The Department of Homeland Security says it’s coordinating with “international cyber partners” in the wake of the widespread attacks. When asked to confirm that Wana Decryptor has struck in the U.S., and at what scale, Acting Deputy Press Secretary Scott McConnell did not provide specifics.

“We routinely provide cybersecurity assistance upon request, including technical analysis and support,” McConnell says. “Information shared with DHS as part of these efforts, including whether a request has been made, is confidential.”

England’s NHS says at least 16 of its organizations were hit by the ransomware. In an statement released around 11:30 a.m. ET, the system’s digital office said, “This attack was not specifically targeted at the NHS and is affecting organizations from across a range of sectors.”

The attack has also hit facilities in Scotland, where Health Secretary Shona Robison says officials are “taking immediate steps to minimize the impact of the attack across NHS Scotland and restrict any disruption.”

“The investigation is at an early stage, but we believe the malware variant is Wanna Decryptor,” the NHS says, referring to software that is being blamed for a number of ransom attacks in Europe Friday.

“At this stage we do not have any evidence that patient data has been accessed,” the system says.

An IT worker at the public health care system tells The Guardian newspaper that it’s the biggest problem they’ve seen in their six years working for the service.

The problem erupted around 12:30 p.m. local time, the IT worker says, with a number of email servers crashing. Other services soon went down, and then, the unidentified NHS worker says, “A bitcoin virus pop-up message had been introduced on to the network asking users to pay $300 to be able to access their PCs. You cannot get past this screen.”

The U.K.’s National Cyber Security Center says it’s working with both the digital office of the NHS and law enforcement.

Images that were posted online of the NHS pop-up look nearly identical to pop-up ransomware windows that hit Spain’s Telefonica, a powerful attack that forced the large telecom to order employees to disconnect their computers from its network and to resort to an intercom system to relay messages, according to Bleeping Computer.


Write a Reply or Comment:

Your email address will not be published.*