Indonesian IT Ministry issues steps for protection against WannaCry ransomware

Myles Longfield 
Shocking that our @NHS is under attack and being held to ransom. #nhscyberattack

Myles Longfield Shocking that our @NHS is under attack and being held to ransom. #nhscyberattack

Technicians around the world are scrambling to apply computer patches and restore infected ones, amid fears that the ransomware worm that seized-up 200,000 computer systems in more than 150 countries, could wreak a new round of havoc Monday morning when businesses reopen and employees log on. However, the vulnerability was still present in many devices, whether it was because they disabled automatic security updates or because the devices relied on unsupported Windows products.

As a result, numerous organizations such as the U.K.'s National Health Service have found themselves unable to access vital data because their files were encrypted by the cyberattack, which demanded ransom payments in the Bitcoin digital currency to unlock information.

It was among a large number of hacking tools and other files that a group known as the Shadow Brokers released on the Internet.

CERT-In today said it has not received any formal report of cyber attack on India's vital networks by the crippling global ransomware, "WannaCry".

It has attacked hundreds of thousands of computers, security experts say, from hospital systems in the United Kingdom and a telecom company in Spain to universities and large companies in Asia. " The company also issued an update to Windows Defender to detect the WannaCrypt attack, and has promised help to customers who have been inflicted by the attack". For companies, it's a combination of reasons, from ignorance to security just not being a priority.

High-profile victims include hospitals in Britain, the Spanish telecoms giant Telefonica, French carmaker Renault, US package delivery company FedEx, Russia's interior ministry and the German rail operator Deutsche Bahn.

Computers around the globe were hacked beginning last Friday using a security flaw in Microsoft's Windows XP operating system, an older version that was no longer given mainstream technical support by the U.S. computing giant. So even people with older computers should go update them. A 22-year old security researcher in the United Kingdom discovered a "kill-switch" to initially stop the spread of the attack.

While Smith said that Microsoft (and its customers) need to take more responsibility for their role, the executive laid the bulk of the responsibility for the massive cyberhack at the feet of government agencies.

Microsoft has introduced a security patch to tackle the situation, and consumers across the globe have been advised to download the solution at the earliest.

He said if a new variant without a "kill switch" popped up, organisations would be on their own to prevent it from taking over their computers.

As per the advisory issued by CERT-In, the ransomware infects other computers on the same network and is also spreading through malicious attachments to e-mails.

Recommended News

We are pleased to provide this opportunity to share information, experiences and observations about what's in the news.
Some of the comments may be reprinted elsewhere in the site or in the newspaper.
Thank you for taking the time to offer your thoughts.