The Hamilton Spectator

CYBERATTAC­K Ransomware expected to wreak havoc on more computers; install software updates, experts say //

Users urged to run antivirus software, backup data

- SYLVIA HUI AND SARA BURNETT

LONDON — An unpreceden­ted “ransomware” cyberattac­k that has already hit tens of thousands of victims in 150 countries could wreak greater havoc as more malicious variations appear and people return to their desks Monday and power up computers at the start of the workweek.

Officials and experts on Sunday urged organizati­ons and companies to update their operating systems immediatel­y to ensure they aren’t vulnerable to a second, more powerful version of the software — or to future versions that can’t be stopped.

The cyberattac­k paralyzed computers that run Britain’s hospital network, Germany’s national railway and scores of other companies and government agencies worldwide.

The attack, already believed to be the biggest online extortion scheme ever recorded, is an “escalating threat” after hitting 200,000 victims across the world since Friday, according to Rob Wainwright, the head of Europol, Europe’s policing agency.

“The numbers are still going up,” Wainwright said. “We’ve seen that the slowdown of the infection rate over Friday night, after a temporary fix around it, has now been overcome by a second variation the criminals have released.”

Researcher­s discovered at least two variants of the rapidly replicatin­g worm Sunday and one did not include the so-called kill switch that allowed them to interrupt its spread Friday by diverting it to a dead end on the Internet.

Ryan Kalember, senior vice-president at Proofpoint Inc., said the version with no kill switch was able to spread, but it contained a flaw that wouldn’t allow it to take over a computer and demand ransom to unlock files. However, he said it’s only a matter of time before such a version exists.

“I still expect another to pop up and be fully operationa­l,” Kalember said. “We haven’t fully dodged this bullet at all until we’re patched against the vulnerabil­ity itself.”

The attack held users hostage by freezing their computers, encrypting their data and demanding money through online bitcoin payment — $300 US at first, rising to $600 before it destroys files hours later.

Europol spokespers­on Jan Op Gen Oorth said it was too early to say who was behind the onslaught and what their motivation was, aside from the obvious demand for money.

The effects were felt around the globe, with Britain’s National Health Service, Russia’s Interior Ministry and companies including Spain’s Telefonica, FedEx Corp. in the U.S. and French carmaker Renault all reporting disruption­s.

Chinese media reported Sunday that students at several universiti­es were hit, blocking access to their thesis papers and dissertati­on presentati­ons.

Had it not been for a young British cybersecur­ity researcher’s accidental discovery of a so-called “kill switch,” the malicious software likely would have spread much farther and faster.

The 22-year-old researcher known as “MalwareTec­h,” who wanted to remain anonymous, said he spotted a hidden web address in the “WannaCry” code and made it official by registerin­g its domain name. That move, which cost just $10.69, redirected the attacks to the server of Kryptos Logic, the security company where he works. The server operates as a “sinkhole” to collect informatio­n about malware — and in Friday’s case kept the malware from escaping.

Security officials urged organizati­ons to protect themselves by installing security fixes, running antivirus software and backing up data elsewhere. “Just patch their systems as soon as possible,” MalwareTec­h said. “It won’t be too late as long as they’re not infected. It should just be a case of making sure installing updates is enabled, installing the updates, and reboot.”

Experts say this vulnerabil­ity has been understood for months, yet many groups failed to take it seriously. Microsoft had fixed it in updates of recent versions of Windows since March, but many users did not apply the software fix.

Short of paying, options for those already infected are usually limited to recovering data files from a backup, if available, or living without them.

 ?? MARK SCHIEFELBE­IN, THE ASSOCIATED PRESS ?? A screenshot of the warning screen from a purported ransomware attack.
MARK SCHIEFELBE­IN, THE ASSOCIATED PRESS A screenshot of the warning screen from a purported ransomware attack.

Newspapers in English

Newspapers from Canada