Hackers seek cash for data
North Korea on Sunday test-launched a ballistic missile that flew about 435 miles, South Korea’s military said, a possible response to the election four days ago of a new South Korean president and as U.S., Japanese and European militaries gather for war games in the Pacific.
South Korea’s Joint Chiefs of Staff confirmed the early morning launch but had few other details, including what type of ballistic missile was fired. A statement said that the missile was fired from near Kusong City, in North Phyongan province, and that the South Korean and U.S. militaries are analyzing the details.
Outsiders will be especially interested in what kind of projectile was fired. While North Korea regularly tests shorterrange missiles, it is also working to master the technology needed to field nuclear-tipped missiles that can reach the U.S. mainland.
North Korea’s past long-range satellite launches have been called clandestine tests of ICBM technology, but it is not believed to have tested a true intercontinental ballistic missile yet.
The Trump administration has called North Korean ballistic and nuclear efforts unacceptable and has swung between threats of military action and offers to talk as it formulates a policy.
The launch also comes as troops from the U.S., Japan and two European nations gather on remote U.S. islands in the Pacific for drills that are partly a message to North Korea.
The USS Carl Vinson, an aircraft supercarrier, is also engaging with South Korean navy ships in waters off the Korean Peninsula, according to Seoul’s Defense Ministry.
A global “ransomware” cyberattack, unprecedented in scale, had technicians scrambling to restore Britain’s crippled hospital network Saturday and secure the computers that run factories, banks, government agencies and transport systems in many other nations.
The worldwide effort to extort cash from computer users is so unprecedented that Microsoft quickly changed its policy, making security fixes available for free for the older Windows systems still used by millions of individuals and smaller businesses.
A malware tracking map showed “WannaCry” infections popping up around the world. Britain canceled or delayed treatments for thousands of patients, even people with cancer. Train systems were hit in Germany and Russia, and phone companies in Madrid and Moscow. Renault’s futuristic assembly line in Slovenia, where rows of robots weld car bodies together, was stopped cold.
In Brazil, the social security system had to disconnect its computers and cancel public access. The state-owned oil company Petrobras and Brazil’s Foreign Ministry also disconnected computers as a precautionary measure, and court systems went down, too.
Britain’s home secretary said one in five of 248 National Health Service groups had been hit. Home Secretary Amber Rudd said all but six of the NHS trusts were back to normal Saturday.
The U.K.’s National Cyber Security Center was “working round the clock” to restore vital health services, while urging people to update security software fixes, run anti-virus software and back up their data elsewhere.
Who perpetrated this wave of attacks remains unknown. Two security firms — Kaspersky Lab and Avast — said they identified the malicious software in more than 70 countries. Both said Russia was hit hardest.
These hackers “have caused enormous amounts of disruption— probably the biggest ransomware cyberattack in history,” said Graham Cluley, a veteran of the anti-virus industry in Oxford, England.
And all this may be just a taste of what’s coming, another cyber security expert warned.
Computer users worldwide — and everyone else who depends on them — should assume that the next big “ransomware” attack has already been launched, and just hasn’t manifested itself yet, Ori Eisen, who founded the Trusona cybersecurity firm in Scottsdale, Arizona, told The Associated Press.
The attack held hospitals and other entities hostage by freezing computers, encrypting data and demanding money through online bitcoin payments. But it appears to be “low-level” stuff, Eisen said Saturday, given the amount of ransom demanded — $300 at first, rising to $600 before it destroys files hours later.
He said the same thing could be done to crucial infrastructure, like nuclear power plants, dams or railway systems.