Companies struggle to recover after cyber attack with ransom
MOSCOW: Companies worldwide struggled to recover last Wednesday after wave of powerful cyberattacks crippled computer systems in Europe, Asia and the United States with a virus similar to the global ransomware assault in May that infected computers.
Researchers at Kaspersky Lab’s Global Research and Analysis Team in Russia said last Wednesday that a regional Ukrainian website had been hacked and used to distribute the ransomware to visitors.
Kaspersky estimated that there had been more than 2,000 attacks, linked to a version of malware called Petya - 60 per cent of them in Ukraine and 30 per cent in Russia, including the country’s largest oil company.
But Kremlin spokesman Dmitry Peskov said “no serious problems” had occurred as a result of the cyberattacks.
Speaking on a conference call last Wednesday, Peskov also said he had no accurate information on the origin of the attacks.
But the damage was worst in Ukraine, and some Ukranian officials had initially expressed suspicions that the attacks originated in Russia.
The hacks targeted government ministries, banks, utilities and other important infrastructure and companies country-wide, demanding ransoms from government employees in the crypto-currency bitcoin.
The virus even downed systems at the site of the former Chernobyl nuclear power plant, forcing scientists to monitor radiation levels manually.
Last Wednesday, Danish shipping giant A.P. MollerMaersk said that it was working to restore its operations a day after being hit by the cyberattack.
“We have contained the issue and are working on a technical recovery plan with key IT partners and global cyber security agencies,” Maersk, which handles one in every seven containers shipped world wide, said in a stock exchange announcement.
The Copenhagen-based group said its APM Terminals were affected “in a number of ports,” but said that its vessels with Maersk Line were “manoeuvrable, able to communicate and crews are safe.”
Cyberattacks also spread as far as India and the United States, where the pharmaceutical giant Merck reported on Twitter that “our company’s computer network was compromised today as part of global hack.” The New Jersey-based company said it was investigating the attack.
France’s biggest bank, BNP Paribas, said last Wednesday said that its real estate unit, which provides services to corporations around Europe, had been hit in the attack.
“The international cyber attack hit our non-bank subsidiary, Real Estate. The necessary measures have been taken to rapidly contain the attack,” the bank said in a statement to Reuters last Wednesday.
Cyber researchers say that the virus used an “exploit” developed by the National Security Agency that was later leaked onto the Internet by hackers.
It is the second massive attack in the past two months to use powerful US exploits in attacks against the IT infrastructure that supports national governments and corporations.
The onslaught of ransomware attacks may be the “new normal,” said Mark Graff, the chief executive of Tellagraff, a cybersecurity company.
“The emergence of Petya and WannaCry really points out the need for a response plan and a policy on what companies are going to do about ransomware,” he said. WannaCry was the ransomware used in the May attack. “You won’t want to make that decision at a time of panic, in a cloud of emotion.”
The attack mainly targeted Eastern Europe but also hit companies in Spain, Denmark, Norway and Britain. Victims included the British advertising and marketing multi-national WPP.
India’s biggest container port was also crippled when a Maersk-run terminal in Mumbai was hit.
The scale of the hacks and the use of ransomware recalled the massive cyberattack in May, in which hackers possibly linked to North Korea disabled computers in more than 150 countries using a flaw that was once incorporated into the National Security Agency’s surveillance tool kit.
Cyber researchers have tied the vulnerability exploited by virus to the one used by WannaCry - a weakness discovered by the NSA years ago that the agency turned into a hacking tool dubbed EternalBlue.
Variants of Petya, like WannaCry, is a worm that spreads quickly to vulnerable systems, said Bill Wright, senior policy counsel for Symantec, the world’s largest cybersecurity firm.
Its pervasiveness is what makes it difficult to control - or to aim at anyone in particular, he said.
Researchers at Kaspersky Lab’s Global Research and Analysis Team in Russia said last Wednesday that a regional Ukrainian website had been hacked and used to distribute the ransomware to visitors.