The Oklahoman

Hackers seek cash for data

- The Associated Press BY SYLVIA HUI, ALLEN G. BREED AND JIM HEINTZ The Associated Press

North Korea on Sunday test-launched a ballistic missile that flew about 435 miles, South Korea’s military said, a possible response to the election four days ago of a new South Korean president and as U.S., Japanese and European militaries gather for war games in the Pacific.

South Korea’s Joint Chiefs of Staff confirmed the early morning launch but had few other details, including what type of ballistic missile was fired. A statement said that the missile was fired from near Kusong City, in North Phyongan province, and that the South Korean and U.S. militaries are analyzing the details.

Outsiders will be especially interested in what kind of projectile was fired. While North Korea regularly tests shorterran­ge missiles, it is also working to master the technology needed to field nuclear-tipped missiles that can reach the U.S. mainland.

North Korea’s past long-range satellite launches have been called clandestin­e tests of ICBM technology, but it is not believed to have tested a true interconti­nental ballistic missile yet.

The Trump administra­tion has called North Korean ballistic and nuclear efforts unacceptab­le and has swung between threats of military action and offers to talk as it formulates a policy.

The launch also comes as troops from the U.S., Japan and two European nations gather on remote U.S. islands in the Pacific for drills that are partly a message to North Korea.

The USS Carl Vinson, an aircraft supercarri­er, is also engaging with South Korean navy ships in waters off the Korean Peninsula, according to Seoul’s Defense Ministry.

A global “ransomware” cyberattac­k, unpreceden­ted in scale, had technician­s scrambling to restore Britain’s crippled hospital network Saturday and secure the computers that run factories, banks, government agencies and transport systems in many other nations.

The worldwide effort to extort cash from computer users is so unpreceden­ted that Microsoft quickly changed its policy, making security fixes available for free for the older Windows systems still used by millions of individual­s and smaller businesses.

A malware tracking map showed “WannaCry” infections popping up around the world. Britain canceled or delayed treatments for thousands of patients, even people with cancer. Train systems were hit in Germany and Russia, and phone companies in Madrid and Moscow. Renault’s futuristic assembly line in Slovenia, where rows of robots weld car bodies together, was stopped cold.

In Brazil, the social security system had to disconnect its computers and cancel public access. The state-owned oil company Petrobras and Brazil’s Foreign Ministry also disconnect­ed computers as a precaution­ary measure, and court systems went down, too.

Britain’s home secretary said one in five of 248 National Health Service groups had been hit. Home Secretary Amber Rudd said all but six of the NHS trusts were back to normal Saturday.

The U.K.’s National Cyber Security Center was “working round the clock” to restore vital health services, while urging people to update security software fixes, run anti-virus software and back up their data elsewhere.

Who perpetrate­d this wave of attacks remains unknown. Two security firms — Kaspersky Lab and Avast — said they identified the malicious software in more than 70 countries. Both said Russia was hit hardest.

These hackers “have caused enormous amounts of disruption— probably the biggest ransomware cyberattac­k in history,” said Graham Cluley, a veteran of the anti-virus industry in Oxford, England.

And all this may be just a taste of what’s coming, another cyber security expert warned.

Computer users worldwide — and everyone else who depends on them — should assume that the next big “ransomware” attack has already been launched, and just hasn’t manifested itself yet, Ori Eisen, who founded the Trusona cybersecur­ity firm in Scottsdale, Arizona, told The Associated Press.

The attack held hospitals and other entities hostage by freezing computers, encrypting data and demanding money through online bitcoin payments. But it appears to be “low-level” stuff, Eisen said Saturday, given the amount of ransom demanded — $300 at first, rising to $600 before it destroys files hours later.

He said the same thing could be done to crucial infrastruc­ture, like nuclear power plants, dams or railway systems.

 ??  ??
 ??  ??

Newspapers in English

Newspapers from United States