The Columbus Dispatch

NKorea might be responsibl­e for attack

- By Tim Feran

The global ransomware attack that infected tens of thousands of computers in nearly 100 countries over the weekend spread to thousands of additional computers Monday, mainly in Asia, as workers logged in at the start of a new workweek.

Meanwhile, intelligen­ce officials and private security experts say that new digital clues point to North Koreanlink­ed hackers as likely suspects in the sweeping attacks.

The indicators are far from conclusive, the researcher­s warned, and it could be weeks, if not months, before investigat­ors are confident enough in their findings to officially point the finger at Pyongyang’s increasing­ly bold corps of digital hackers.

While there have been no reports of major ransomware attacks in central Ohio, Columbus-based organizati­ons are on the alert for the next attack.

In Europe, where the cyberattac­k first emerged, officials said it appeared that a muchfeared second wave — based on copycat variants of the original malicious software — had not yet materializ­ed.

The new disruption­s were most apparent in Asia, where many workers had already left for the day Friday when the attack broke out.

China alone reported disruption­s at nearly 40,000 organizati­ons, including about 4,000 academic institutio­ns, figures that experts say are most likely to be low estimates, given the prevalence of pirated software there.

In central Ohio, the member companies of the Columbus Collaborat­ory — American Electric Power,

Battelle, Cardinal Health, Huntington Bancshares, L Brands, Nationwide and OhioHealth — jumped on the phone Saturday morning to share informatio­n on what they learned about this latest wave of attacks. The companies talked again Monday to discuss new developmen­ts.

The Columbus Collaborat­ory was formed in February 2014 by the member companies to help analyze data and combat the latest cyber threats.

Sharing such intelligen­ce is a key defensive strategy to ensure a rapid response, said Jeff Schmidt, the Collaborat­ory’s head of cybersecur­ity.

“All companies need to be aware of defensive strategies and not just utilize the bare necessitie­s to meet regulatory standards,” Schmidt said.

In addition, the Collaborat­ory is mining through WikiLeaks and data dumps to prepare for whatever comes next.

The ransomware attacks are the latest wave in computer crime, experts say.

“Ransomware is the ... next developmen­t — after ‘Denial of Service’ and data breach theft — to not only enter computers, but inflict psychologi­cal and financial loss at the same time,” said Mark Skilton, a professor who researches cybersecur­ity at Warwick Business School in England.

“The risk and impact of cyber weapons can do the same or more harm than physical weapons,” Skilton added. “It can indirectly kill patients, change traffic controls, alter car onboard steering systems, change

election outcomes and more.”

Pictures posted on social media showed screens of National Health Service computers in England with images demanding payment of $300 worth of the online currency Bitcoin, saying: “Ooops, your files have been encrypted!”

But the attackers are hardly using cuttingedg­e technology, said Columbus-based online security expert C. Matthew Curtin, founder of Interhack Corp.

“There’s nothing new here, really,” Curtin said. “The attackers used exploits that target old systems that can’t be patched.

“If (affected companies and organizati­ons) have still got these (old programmin­g) things in place, it’s a failure to plan.”

The so-called ransomware continued to ripple through politics and markets Monday. Russian president Vladimir Putin blamed the United States, noting that the malicious software used in the attack was originally developed by the National Security Agency. It was then stolen and released by an elite hacking group known as the Shadow Brokers.

The attack was so widespread across the world that Microsoft has called for a “digital Geneva convention of rights,” and Skilton called for a worldwide “cyber police force” to help manage these escalating threats with the right level of specialist skills, and not just vendors sorting it out for themselves.”

But Curtin dismissed the idea of a global police force for cyberattac­ks as “an absurd and even stupid idea. ...

Let’s not forget that it’s an NSA and CIA work product that made this accessible to the attackers.”

To effectivel­y battle ransomware and similar threats, companies and organizati­ons should work together in the same way that Columbus-based organizati­ons do with the Collaborat­ory, Schmidt said.

“To compete effectivel­y in this environmen­t, companies must start innovating and collaborat­ing as effectivel­y as the bad guys,” he said. “The bad guys are dumping more data to share new tools and resources to execute increasing­ly sophistica­ted attacks.”

President Donald Trump’s homeland security adviser said Monday that the malware is “in the wild,” but so far has not infiltrate­d U.S. government systems.

Tom Bossert, assistant to the president for homeland security and counterter­rorism, said three variants of the malware have been discovered, and the U.S. government was closely monitoring the situation with officials in Britain.

“Overall, the U.S. infection rate has been lower than many parts of the world, but we may still see significan­t impacts in additional networks as these malware attacks morph and change,” Bossert told reporters at the White House. “We had a small number of affected parties in the U.S., including FedEx. As of today, no federal systems are affected.”

Newspapers in English

Newspapers from United States