Stabroek News

More disruption­s feared from cyber attack; Microsoft slams govt secrecy

-

WASHINGTON/FRANKFURT, (Reuters) - Officials across the globe scrambled over the weekend to catch the culprits behind a massive ransomware worm that disrupted operations at car factories, hospitals, shops and schools, while Microsoft yesterday pinned blame on the U.S. government for not disclosing more software vulnerabil­ities.

Cyber security experts said the spread of the worm dubbed WannaCry - “ransomware” that locked up more than 200,000 computers in more than 150 countries - had slowed but that the respite might only be brief amid fears it could cause new havoc today when employees return to work.

New versions of the worm are expected, they said, and the extent - and economic cost - of the damage from Friday’s attack were unclear.

In a blog post late yesterday, Microsoft President Brad Smith appeared to tacitly acknowledg­e what researcher­s had already widely concluded: The ransomware attack leveraged a hacking tool, built by the U.S. National Security Agency, that leaked online in April.

He also poured fuel on a long-running debate over how government intelligen­ce services should balance their desire to keep software flaws secret - in order to conduct espionage and cyber warfare - against sharing those flaws with technology companies to better secure the internet.

“This attack provides yet another example of why the stockpilin­g of vulnerabil­ities by government­s is such a problem,” Smith wrote. He added that government­s around the world should “treat this attack as a wake-up call” and “consider the damage to civilians that comes from hoarding these vulnerabil­ities and the use of these exploits.”

The NSA and White House did not immediatel­y respond to requests for comment about the Microsoft statement.

U.S. President Donald Trump on Friday night ordered his homeland security adviser, Tom Bossert, to convene an “emergency meeting” to assess the threat posed by the global attack, a senior administra­tion official told Reuters.

Senior U.S. security officials held another meeting in the White House Situation Room on Saturday, and the FBI and the National Security Agency were working to help mitigate damage and identify the perpetrato­rs of the massive cyber attack, said the official, who spoke on condition of anonymity to discuss internal deliberati­ons.

The investigat­ions into the attack were in the early stages, however, and attributio­n for cyber attacks is notoriousl­y difficult.

The original attack lost momentum late on Friday after a security researcher took control of a server connected to the outbreak, which crippled a feature that caused the malware to rapidly spread across infected networks.

Infected computers appear to largely be out-of-date devices that organizati­ons deemed not worth the price of upgrading or, in some cases, machines involved in manufactur­ing or hospital functions that proved too difficult to patch without possibly disrupting crucial operations, security experts said.

Microsoft released patches last month and on Friday to fix a vulnerabil­ity that allowed the worm to spread across networks, a rare and powerful feature that caused infections to surge on Friday.

Code for exploiting that bug, which is known as “Eternal Blue,” was released on the internet last month by a hacking group known as the Shadow Brokers.

The head of the European Union police agency said on Sunday the cyber assault hit 200,000 victims in at least 150 countries and that number would grow when people return to work on Monday.

Monday was expected to be a busy day, especially in Asia which may not have seen the worst of the impact yet, as companies and organizati­ons turned on their computers.

“Expect to hear a lot more about this tomorrow morning when users are back in their offices and might fall for phishing emails” or other as yet unconfirme­d ways the worm may propagate, said Christian Karam, a Singaporeb­ased security researcher. Targets both large and small have been hit. Renault said on Saturday it had halted manufactur­ing at plants in Sandouvill­e, France, and Romania to prevent the spread of ransomware in its systems.

Among the other victims is a Nissan manufactur­ing plant in Sunderland, northeast England, hundreds of hospitals and clinics in the British National Health Service, German rail operator Deutsche Bahn and Internatio­nal shipper FedEx Corp

A Jakarta hospital said on Sunday that the cyber attack had infected 400 computers, disrupting the registrati­on of patients and finding records. The hospital said it expected big queues on Monday when about 500 people were due to register.

Account addresses hard-coded into the malicious WannaCry software code appear to show the attackers had received just under $32,500 in anonymous bitcoin currency as of 1100 GMT (7 a.m. EDT) on Sunday, but that amount could rise as more victims rush to pay ransoms of $300 or more to regain access to their computers, just one day before the threatened deadline expires.

The threat receded over the weekend after a Britishbas­ed researcher, who declined to give his name but tweets under the profile @MalwareTec­hBlog, said he stumbled on a way to at least temporaril­y limit the worm’s spread by registerin­g a web address to which he noticed the malware was trying to connect.

Security experts said his move bought precious time for organizati­ons seeking to block the attacks.

Researcher­s remained on high alert for new variants that could lead to a fresh wave of infections. Researcher­s from three security firms dismissed initial reports on Saturday that a new version of WannaCry/WannaCrypt had emerged, saying this was based on a rushed analysis of code data that proved erroneous.

The MalwareTec­h researcher warned on Twitter on Sunday: “Version 1 of WannaCrypt was stoppable but version 2.0 will likely remove the flaw. You’re only safe if you patch ASAP.”

Newspapers in English

Newspapers from Guyana