Yuma Sun

Lucky break slows cyberattac­k; what’s coming could be worse

-

LONDON — As terrifying as the unpreceden­ted global “ransomware” attack was, cybersecur­ity experts say it’s nothing compared to what might be coming — especially if companies, organizati­ons and government­s don’t make major fixes.

Had it not been for a young cybersecur­ity researcher’s accidental discovery of a so-called “kill switch,” the malicious software likely would have spread much farther and faster. Security experts say this attack should wake up every corporate board room and legislativ­e chamber around the globe.

Security experts tempered the alarm bells by saying that widespread attacks are tough to pull off. This one worked because of a “perfect storm” of conditions, including a known and highly dangerous security hole in Microsoft Windows, tardy users who didn’t apply Microsoft’s March software fix, and malware designed to spread quickly once inside university, business and government networks.

What’s worse, those responsibl­e were able to borrow a weaponized “exploit,” apparently created by the U.S. National Security Agency, to launch the attack in the first place

Darien Huss, a 28-yearold research engineer who assisted the anonymous British researcher lauded a hero, said he was “still worried for what’s to come in the next few days because it really would not be so difficult for the actors behind this to re-release their code without a kill switch or with a better kill switch. Or we could potentiall­y see copycats mimic the delivery or exploit method they used.”

Now that this “WannaCry” malware is out there, the world’s computer systems are vulnerable to a degree they haven’t been before, unless people everywhere move quickly to install Microsoft’s security patches.

This is already believed to be the biggest online extortion attack ever recorded, disrupting computers that run factories, banks, government agencies and transport systems in nations as diverse as the U.S., Russia, Ukraine, Brazil, Spain and India. Europol, the European Union’s police agency, said the onslaught was at “an unpreceden­ted level and will require a complex internatio­nal investigat­ion to identify the culprits.”

The attack held hospitals and other entities hostage by freezing computers, encrypting their data and demanding money through online bitcoin payment — $300 at first, rising to $600 before it destroys files hours later.

The worldwide effort to extort cash from computer users is so unpreceden­ted in its nature — the first widely successful example of ransomware that self-replicates like a virus — that Microsoft quickly changed its policy, announcing free security patches to fix this vulnerabil­ity in the older Windows systems still used by millions of individual­s and smaller businesses. Normally, such patches are reserved for organizati­ons willing to pay for extended support.

Security officials in Britain urged organizati­ons to protect themselves by installing the security fixes, running antivirus software and backing up data elsewhere. Experts say this vulnerabil­ity has been understood among experts for months, yet too many organizati­ons either failed to take it seriously or chose not to share what they’d found.

The ransomware exploited a vulnerabil­ity that has been patched in updates of recent versions of Windows since March, but Microsoft didn’t make freely available the patch for Windows XP and other older systems.

“The problem is the larger organizati­ons are still running on old, no longer supported operating systems,” said Lawrence Abrams, a New York-based blogger who runs BleepingCo­mputer.com. “So they no longer get the security updates they should be.”

Britain’s National Cyber Security Center said it could have been much worse if not for a young cybersecur­ity researcher who helped to halt its spread by accidental­ly activating a skill switch in the malicious software.

The 22-year-old Britain-based researcher, identified online only as MalwareTec­h, explained Saturday that he spotted a hidden web address in the “WannaCry” code and made it official by registerin­g its domain name. That inexpensiv­e move redirected the attacks to MalwareTec­h’s server, which operates as a “sinkhole” to keep malware from escaping.

His move may have saved government­s and companies millions of dollars and slowed the outbreak before U.S.-based computers were more widely infected.

But the kill switch couldn’t help those already infected. Short of paying, options for these individual­s and companies are usually limited to recovering data files from a backup, if available, or living without them.

The Windows vulnerabil­ity in question was purportedl­y identified by the NSA for its own intelligen­cegatherin­g purposes. (Intelligen­ce officials wouldn’t comment on the authentici­ty of the claims.) The tools appeared stolen by hackers, who dumped them on the internet.

British cybersecur­ity expert Graham Cluley doesn’t want to blame the NSA for the attack.

“There are other criminals who’ve launched this attack, and they are ultimately responsibl­e for this,” he said from his home in Oxford, England. “But there’s clearly some culpabilit­y on the part of the U.S. intelligen­ce services. Because they could have done something ages ago to get this problem fixed, and they didn’t do it.”

He said most people “are living an online life,” and these agencies have a duty to protect their countries’ citizens in that realm as well.

“Obviously, they want those tools in order to spy on people of interest, on other countries, to conduct surveillan­ce,” Cluley said. “It’s a handy thing to have, but it’s a dangerous thing to have. Because they can be used against you. And that’s what’s happening right now.”

 ?? ASSOCIATED PRESS ?? THIS 2016 FILE PHOTO SHOWS the Microsoft logo in Issy-les-Moulineaux, outside Paris, France. The cyberextor­tion attack hitting dozens of countries was a “perfect storm” of sorts. It combined a known and highly dangerous security hole in Microsoft...
ASSOCIATED PRESS THIS 2016 FILE PHOTO SHOWS the Microsoft logo in Issy-les-Moulineaux, outside Paris, France. The cyberextor­tion attack hitting dozens of countries was a “perfect storm” of sorts. It combined a known and highly dangerous security hole in Microsoft...

Newspapers in English

Newspapers from United States