Lundi, 26 Octobre 2020
Dernières nouvelles
Principale » Microsoft Blames NSA For WCry Ransomware

Microsoft Blames NSA For WCry Ransomware

15 Mai 2017

An global operation is under way to find the perpetrators behind the unprecedented attack which has infected 200,000 machines in 150 countries since Friday.

Over the last week there has been a lot of news about the WCry Ransomware that affected hundreds of thousands of computer around the world.

The huge WannaCry ransomware attack that brought parts of the NHS to a standstill at the end of last week has thrown the focus onto a couple of areas that should be bread and butter for the channel. "Each new report should be seen as yet another reminder for organisations to take cyber security seriously, before we have the cyber equivalent of a pandemic", he added.

Not sure if you are at risk from the cyber attack?

ISLANDERS are being urged to be vigilant and ensure their computers are properly protected following the worldwide cyber-attack. "I think that is encouraging".

Since that initial attack, agencies and companies from the police to banks and communications firms have put preventive measures in place, while Qihoo 360 Technology Co., Tencent Holdings Ltd. and other cybersecurity firms have begun making protection tools available, the internet overseer said.

A government regulator warned the NHS in July that updating hardware and software was "a matter of urgency".

"Right now, just about every IT department has been working all weekend rolling this out", said Dan Wire, spokesman at Fireeye Security.

"It seems like Jeremy Hunt is hiding", Lib Dem leader Tim Farron said.

Shares Holding Above Moving Averages: Cisco Systems, Inc. (NASDAQ:CSCO)
Marathon Oil Corporation (NYSE:MRO) announced a cash dividend payment of $0.05 per share is scheduled to be paid on June 12, 2017. Companies like FireEye (FEYE - Free Report) and Palo Alto Networks (PANW - Free Report) saw their shares soar as a result.

"I'm anxious about how the numbers will continue to grow when people go to work and turn on their machines on Monday morning".

More than 200,000 victims in 150 countries have been registered so far, with warnings the impact could spread further on Monday. "The truth is, a successful cyberattack now has the potential to be more damaging and detrimental to a business than any recession", said Ross Brewer, vice president and managing director of EMEA at LogRhythm.

A ULHT statement said: "Due to the ongoing issues relating to the cyber attack on the NHS on Friday, we will be cancelling all routine activity in our hospitals on Monday 15 May".

Microsoft has issued a warning to world governments about the way many store information on security flaws. The company responded to the attacks with a strongly worded blog post, criticizing governments for "stockpiling" information about cybersecurity vulnerabilities, and likeningthe WannaCry attack to the USA military "having some of its Tomahawk missiles stolen".

Microsoft references the WannaCry ransomware's source as an vulnerability known by the NSA, noting that similar security holes were revealed on WikiLeaks in documents stolen from the Central Intelligence Agency. "An equivalent scenario with conventional weapons would be the United States military having some of its Tomahawk missiles stolen", it complained in the wake of WannaCry. "We need the tech sector, customers, and governments to work together to protect against cybersecurity attacks".

Acute hospital sites in Lanarkshire, as well as GP surgeries, dental practices and other primary-care centres around the country, were among those hit. Why were so many NHS systems still running this out-of-date software?

"While there is now no suggestion that systems within Northern Ireland have been targeted, we remain conscious that we must act to ensure the integrity of cyber networks and take appropriate action to reduce the threat posed by cyber criminals".

Britain's spending watchdog, the National Audit Office, warned in 2014 that some NHS organisations had "limited understanding of the threat and they do not yet understand what would represent an appropriate level of threat protection".