Share

Unprecedented global cyber-attack is a wake-up call, says Microsoft

Washington - An unrivalled global cyber-attack is poised to continue claiming victims on Monday as people return to work and turn on their desktop computers, even as hospitals and other facilities gained the upper hand against the first wave.

More than 200 000 computers in at least 150 countries have so far been infected, according to Europol, the European Union’s law enforcement agency. The UK’s National Cyber Security Centre said new cases of so-called ransomware are possible “at a significant scale.”

“We’ve seen the rise of ransomware becoming the principal threat, I think, but this is something we haven’t seen before - the global reach is unprecedented,” Europol Executive Director Rob Wainwright said on ITV’s Peston on Sunday broadcast.

The malware used a technique purportedly stolen from the US National Security Agency. It affected the UK’s National Health Service, Russia’s Ministry of Interior, Germany’s Deutsche Bahn rail system, automakers Nissan and Renault, logistics giant FedEx, and other company and hospital computer systems in countries from Eastern Europe to the USand Asia.

The hackers used the tool to encrypt files within affected computers, making them inaccessible, and demanded ransom - typically $300 in bitcoin.  Russia and Ukraine had a heavy concentration of infections, according to Dutch security company Avast Software BV.

Microsoft president Brad Smith, in a blog post on Sunday, said the attack is a “wake-up call” for governments in the US and elsewhere to stop stockpiling tools to exploit digital vulnerabilities. “They need to take a different approach and adhere in cyberspace to the same rules applied to weapons in the physical world,” he said.

Normal operations

About 97% of UK facilities and doctors disabled by the attack were back to normal operation, Home Secretary Amber Rudd said on Saturday after a government meeting. At the height of the attack Friday and early Saturday, 48 organisations in the NHS were affected, and hospitals in London, North West England and Central England urged people with non-emergency conditions to stay away as technicians tried to stop the spread of the malicious software.

The initial attack was stifled when a security researcher disabled a key mechanism used by the worm to spread, but experts said the hackers were likely to mount a second attack because so many users of personal computers with Microsoft operating systems couldn’t or didn’t download a security patch released in March that Microsoft had labelled “critical.”

Microsoft said in a blog post on Saturday that it was taking the “highly unusual“ step of providing the patch for older versions of Windows it was otherwise no longer supporting, including Windows XP and Windows Server 2003.

While the scale of the attack shows Microsoft needs to strengthen its own capabilities, “there is simply no way for customers to protect themselves against threats unless they update their system,” Smith said in his blog post. “Otherwise they’re literally fighting the problems of the present with tools from the past.

“This attack is a powerful reminder that information technology basics like keeping computers current and patched are a high responsibility for everyone, and it’s something every top executive should support."

Matt Suiche, founder of United Arab Emirates-based cyber security firm Comae Technologies, said he’s seen a variant on the original malware that still contains a kill-switch mechanism - though future versions could find a way to overcome it. “We are lucky that this logic bug is still present,” Suiche said.

Victims have paid about $30 000 in ransom so far, with the total expected to rise substantially next week, said Tom Robinson, chief operating officer and co-founder of Elliptic Enterprises, a ransomware consultant that works with banks and companies in the UK, US and Europe. Robinson, in an interview by email, said he calculated the total based on payments tracked to bitcoin addresses specified in the ransom demands.

Last year an acute-care hospital in Hollywood paid $17 000 in bitcoin to an extortionist who hijacked its computer systems and forced doctors and staff to revert to pen and paper for record-keeping.

Business targets

A spokesperson for Spain’s Telefonica said the hack affected some employees at its headquarters, but the phone company is attacked frequently and the impact of Friday’s incident wasn’t major. FedEx said it was “experiencing interference,” the Associated Press reported.

Renault halted production at some factories to stop the virus from spreading, a spokesman said Saturday, while Nissan’s UK car plant in Sunderland, in northeast England, was affected without causing any major impact on business, an official said.

In Germany, Deutsche Bahn faced “technical disruptions” on electronic displays at train stations, but travel was unaffected, the company said in a statement on its website. Newspaper reports showed images of a ransomware message on display screens blocking train information.

Russia’s Interior Ministry, with oversight of the police forces, said about “1 000 computers were infected,” which it described as less than 1% of the total, according to its website.

Indonesia’s government reported two hospitals in Jakarta were affected.

While any size company could be vulnerable, many large organizations with robust security departments would have prioritized the update that Microsoft released in March and wouldn’t be vulnerable to Friday’s attack.

Users Tricked

Ransomware is a particularly stubborn problem because victims are often tricked into allowing the malicious software to run on their computers, and the encryption happens too fast for security software to catch it. Some security expects calculate that ransomware may bring in as much as $1 billion a year in revenue for the attackers.

The attack was apparently halted in the afternoon in the Uk when a researcher took control of an Internet domain that acted as a kill switch for the worm’s propagation, according to Ars Technica.

“I will confess that I was unaware registering the domain would stop the malware until after I registered it, so initially it was accidental,” wrote the researcher, who uses the Twitter name @MalwareTechBlog. “So long as the domain isn’t revoked, this particular strain will no longer cause harm, but patch your systems ASAP as they will try again.”

There is a high probability that Russian-language cybercriminals were behind the attack, said Aleks Gostev, chief cybersecurity expert for Kaspersky Labs.

“Ransomware is traditionally their topic,” he said. “The geography of attacks that hit post-Soviet Union most also suggests that.”


We live in a world where facts and fiction get blurred
Who we choose to trust can have a profound impact on our lives. Join thousands of devoted South Africans who look to News24 to bring them news they can trust every day. As we celebrate 25 years, become a News24 subscriber as we strive to keep you informed, inspired and empowered.
Join News24 today
heading
description
username
Show Comments ()
Rand - Dollar
18.99
-0.3%
Rand - Pound
24.07
+0.2%
Rand - Euro
20.58
+0.0%
Rand - Aus dollar
12.36
+0.5%
Rand - Yen
0.13
+0.7%
Platinum
902.95
+0.1%
Palladium
998.75
-0.7%
Gold
2,153.42
-0.3%
Silver
24.92
-0.5%
Brent Crude
86.89
+1.8%
Top 40
65,837
-0.6%
All Share
72,075
-0.5%
Resource 10
53,082
-0.4%
Industrial 25
99,417
-1.1%
Financial 15
16,638
+0.1%
All JSE data delayed by at least 15 minutes Iress logo
Company Snapshot
Editorial feedback and complaints

Contact the public editor with feedback for our journalists, complaints, queries or suggestions about articles on News24.

LEARN MORE
Government tenders

Find public sector tender opportunities in South Africa here.

Government tenders
This portal provides access to information on all tenders made by all public sector organisations in all spheres of government.
Browse tenders