Lethbridge Herald

Global ‘ransomware’ attack seeks cash for data

- Sylvia Hui, Allen Breed and Jim Heintz

A global “ransomware” attack, unpreceden­ted in scale, had technician­s scrambling to restore Britain’s crippled hospital network Saturday and secure the computers that run factories, banks, government agencies and transport systems in many other nations.

The worldwide cyberextor­tion attack is so unpreceden­ted, in fact, that Microsoft quickly changed its policy, announcing security fixes available for free for the older Windows systems still used by millions of individual­s and smaller businesses.

After an emergency government meeting Saturday in London, Britain’s home secretary said one in five of 248 National Health Service groups had been hit. The onslaught forced hospitals to cancel or delay treatments for thousands of patients, even some with serious aliments like cancer.

Home Secretary Amber Rudd said 48 NHS trusts were affected and all but six were now back to normal. The U.K.’s National Cyber Security Center said it is “working round the clock” to restore vital health services.

Security officials in Britain urged organizati­ons to protect themselves by updating their security software fixes, running anti-virus software and backing up data elsewhere.

Who perpetrate­d this wave of attacks remains unknown. Two security firms — Kaspersky Lab and Avast — said they identified the malicious software in more than 70 countries. Both said Russia was hit hardest.

“This is obviously by far the worst ransomware outbreak we’ve seen in, I think, forever,” said Lawrence Abrams, a New York-based malware expert who runs BleepingCo­mputer.com.

And all this may be just a taste of what’s coming, a leading cyber security expert warned.

Computer users worldwide — and everyone else who depends on them — should assume that the next big “ransomware” attack has already been launched, and just hasn’t manifested itself yet, Ori Eisen, who founded the Trusona cybersecur­ity firm in Scottsdale, Arizona, told The Associated Press.

The attack held hospitals and other entities hostage by freezing computers, encrypting data and demanding money through online bitcoin payments. But it appears to be “low-level” stuff, Eisen said Saturday, given the amount of ransom demanded — $300 at first, rising to $600 before it destroys files hours later.

He said the same thing could be done to crucial infrastruc­ture, like nuclear power plants, dams or railway systems.

This is already believed to be the biggest online extortion attack ever recorded, disrupting services in nations as diverse as the U.S., Russia, Ukraine, Spain and India.

The ransomware appeared to exploit a vulnerabil­ity in Microsoft Windows that was purportedl­y identified by the U.S. National Security Agency for its own intelligen­ce-gathering purposes. The NSA tools were stolen by hackers and dumped on the internet.

A young cybersecur­ity researcher has been credited with helping to halt the ransomware’s spread by accidental­ly activating a so-called “kill switch” in the malicious software.

The 22-year-old Britain-based researcher, identified online only as MalwareTec­h, explained Saturday how he inadverten­tly discovered Friday that the software’s spread could be stopped by registerin­g a garbled domain name. His $11 purchase of the name may have saved government­s and companies around the world millions.

Newspapers in English

Newspapers from Canada