Arkansas Democrat-Gazette

Asia takes cyber hit; no 2nd wave arises

- COMPILED BY DEMOCRAT- GAZETTE STAFF FROM WIRE REPORTS

HONG KONG — A global cyberattac­k spread to thousands of additional computers Monday as workers logged in at the start of a new workweek.

Universiti­es, hospitals, businesses and daily life were disrupted, but no catastroph­ic breakdowns were reported. In Europe, where the cyberattac­k first emerged, officials said it appeared that a much- feared second wave — based on copycat variants of the original malicious software — had not yet materializ­ed.

The new disruption­s were most apparent in Asia, where many workers had already left for the day Friday when the attack broke out.

China alone reported disruption­s at nearly 40,000 organizati­ons, including about

4,000 academic institutio­ns, figures that experts say are most likely to be low estimates, given the prevalence of pirated software there.

The list of affected institutio­ns includes two of China’s most prestigiou­s schools of higher education, Tsinghua and Peking universiti­es; a movie theater chain in South Korea; and blue- chip companies in Japan such as Hitachi and Nissan, which emphasized that their business operations were not impaired.

The cyberattac­k has afflicted 200,000 computers in more than 150 countries. Transmitte­d by email, the malicious software, or malware, locks users out of their computers, threatenin­g to destroy data if a ransom is not paid.

The so- called ransomware continued to ripple through politics and markets Monday. Russia’s president, Vladimir Putin, blamed the United States, noting that the malicious software used in the attack was originally developed by the National Security Agency. The informatio­n was then stolen and released by an elite hacking group known as the Shadow Brokers.

Monday morning, 11 technology companies in China, mostly dealing in Internet security, suspended trading after their stocks rose as much as 10 percent, the daily limit. Shares in European cybersecur­ity firms gained in early trading Monday as investors appeared to target companies that would benefit from increased attention on keeping data, networks and computers secure.

The disruption­s in China cast a shadow over a major internatio­nal conference that Beijing was hosting to promote its $ 1 trillion One Belt, One Road initiative, with participat­ion from world leaders such as Putin.

On social media, students reported being locked out of final papers, and other people said ATMs, some government offices and the payment systems at gas stations had been affected. Talk of how to avoid the virus was widespread on the messaging app WeChat over the weekend.

Securities and banking regulators in the country issued warnings to businesses and financial institutio­ns to audit their networks before putting computers to use to limit damage from the intrusion.

The state- run oil company, PetroChina, confirmed that the attack had disrupted the electronic payment capabiliti­es at many of its gas stations over the weekend. By Sunday, 80 percent of its stations were functionin­g normally again, it said.

The southern city of Yiyang, with a population of more than 4 million people, said its traffic department had to disconnect from the Internet and suspend all operations, and Xi’an, a city of more than 8 million in central China, said the processing of drivers’ tests and traffic violations would be affected because its traffic department had similarly been cut off.

Elsewhere, in France, automaker Renault decided not to reopen a 3,500- employee plant Monday as a “preventati­ve step.” And Lebanon’s central bank temporaril­y suspended electronic transactio­ns as a precaution.

In Britain, many hospitals and clinics that are part of the country’s National Health Service were still having computer problems. Patients continued to be turned away because their records were inaccessib­le.

In the U. S., where the effects haven’t appeared to be widespread, investigat­ors believe that more companies have been attacked but have not yet come forward to report it, a law enforcemen­t official said in an interview. The official was not authorized to speak publicly about the investigat­ion.

In Japan, about 2,000 terminals in 600 locations, used by individual­s as well as by large companies, were most likely affected by the ransomware attack, according to JPCert, an independen­t group that helps respond to and track computer security breaches.

TAKING WANNACRY APART

The spread of the malware has focused attention on why a software patch issued by Microsoft in March had not been installed by more users. Microsoft has complained for years that a majority of computers running its software are using pirated versions.

The Australian prime minister, Malcolm Turnbull, said the attacks in his country seemed to be limited mostly to small businesses.

“We haven’t seen the impact that they’ve seen, for example, in the United Kingdom,” Turnbull said. “But it is very important that business and enterprise­s that are in the private or government sector make sure those patches for the Windows systems that were made available by Microsoft in March are installed.”

Britain’s National Crime Agency, which is taking part in a global investigat­ion into the attack, said another wave of attacks could still occur, and it urged computer users to take precaution­s.

Security researcher­s in the meantime have been disassembl­ing the malicious software, known as WannaCry, in hopes of uncovering clues to who released it. They are doing the same with the “phishing” emails that helped the ransomware

embed itself in computers.

Investigat­ors also hope to learn more by examining ransom payments made by computer users via bitcoin, the hard- to- trace digital currency often used by criminals.

WannaCry encrypted users’ computer files and displayed a message demanding anywhere from $ 300 to $ 600 to release them; failure to pay would leave the data mangled and likely beyond repair.

A cybersecur­ity researcher in Britain managed to slow its spread by activating the software’s so- called kill switch, but there were fears that the cybercrimi­nals would release even more malicious versions.

Steve Grobman of the security company McAfee said forensics experts were looking at how the ransomware was written and how it was run. WannaCry is a sophistica­ted piece of work, he said, which helps rule out the possibilit­y it was released by mere pranksters or lower- level thieves.

As for anonymous bitcoin transactio­ns, he said, it is sometimes possible to follow them until an identifiab­le person is found.

Elliptic Enterprise­s, a Londonbase­d company that tracks illicit use of bitcoin, said that as of early Monday only about $ 50,000 had been paid in ransoms. The company calculated the total on the basis of payments tracked to bitcoin addresses specified in the ransom demands, adding that it expects the total to rise.

Eiichi Moriya, a cybersecur­ity expert and professor at Japan’s Meiji University, warned that paying the ransom would not guarantee a fix.

“You are dealing with a criminal,” he said. “It’s like after a robber enters your home. You can change the locks, but what has happened cannot be undone.”

KILL SWITCH’S DISCOVERER

Separately, the 22- year- old British computer expert credited with cracking the WannaCry cyberattac­k said in an interview that he doesn’t consider himself a hero but fights malware because “it’s the right thing to do.”

Marcus Hutchins, who works for Los Angeles- based Kryptos Logic and has long tweeted anonymousl­y under the handle MalwareTec­h, said Monday that hundreds of computer

experts worked throughout the weekend to fight the virus, which paralyzed computers around the globe.

“I’m definitely not a hero,” he said. “I’m just someone doing my bit to stop botnets” — or networks of malware- infected private computers.

The surfer from the south coast of England discovered the kill switch that slowed the outbreak on Friday. He has spent the next three days helping fight the cyberattac­k.

Hutchins said he stumbled across the solution when he was analyzing a sample of the malicious code and noticed it was linked to an unregister­ed Web address. He promptly registered the domain, something he said he regularly does to discover ways to track or stop cyberthrea­ts, and found that that stopped the worm from spreading.

Salim Neino, chief executive officer of Kryptos Logic, said Hutchins took over the kill switch Friday afternoon European time, before it could fully affect the United States.

“Marcus, with the program he runs at Kryptos Logic, not only saved the United States but also prevented further damage to the rest of the world,” Neino said. “Within a few moments, we were able to validate that there was indeed a kill switch. It was a very exciting moment. This is something that Marcus validated himself.”

Kryptos Logic is one of hundreds of companies working to fight online threats for companies, government agencies and individual­s around the world.

Hutchins also is part of a global community that constantly watches for attacks and works to thwart them, often sharing informatio­n on Twitter. It’s not uncommon for members to use aliases to protect from retaliator­y attacks and ensure privacy.

 ?? AP/ DITA ALANGKARA ?? A patient takes a nap in her wheelchair as she waits Monday with others at the registrati­on desk at Dharmais Cancer Hospital in Jakarta, Indonesia, after the hospital’s informatio­n system was affected by the global cyberattac­k.
AP/ DITA ALANGKARA A patient takes a nap in her wheelchair as she waits Monday with others at the registrati­on desk at Dharmais Cancer Hospital in Jakarta, Indonesia, after the hospital’s informatio­n system was affected by the global cyberattac­k.

Newspapers in English

Newspapers from United States