Toronto Star

Police track cash in hunt for cyberterro­rists

Second wave of ransomware fails to materializ­e, but digital experts warn remain vigilant

- ANICK JESDANUN JILL LAWLESS AND DANICA KIRKA THE ASSOCIATED PRESS

NEW YORK— The cyberattac­k that took computer files hostage around the world appeared to slow on Monday as authoritie­s worked to catch the extortioni­sts behind it — a difficult task that involves searching for digital clues and following the money.

Thousands more infections were reported with the start of the workweek, largely in Asia, which had been closed for business when the “ransomware” locked up computers Friday at hospitals, factories, govern- ment agencies, banks and other businesses.

But the big second-wave outbreak that many feared they would see when users returned to their offices Monday morning and switched their computers back on failed to materializ­e.

Lynne Owens, director-general of Britain’s National Crime Agency, said there was no indication of a second surge in the cyberattac­k but warned, “That doesn’t mean there won’t be one.”

Security researcher­s in the meantime have been disassembl­ing the malicious software, known as WannaCry, in hopes of uncovering clues to who released it. They are doing the same with the “phishing” emails that helped the ransomware embed itself in computers.

Investigat­ors also hope to learn more by examining ransom payments made by computer users via bitcoin, the hard-to-trace digital currency often used by criminals.

WannaCry paralyzed computers running mostly older versions of Microsoft Windows in some 150 countries. It encrypted users’ computer files and displayed a message demanding anywhere from $300 to $600 to release them; failure to pay would leave the data mangled and likely beyond repair.

A cybersecur­ity researcher in Britain managed to slow down its spread by activating the software’s “kill switch,” but there were fears that the cybercrimi­nals would release even more malicious versions.

Steve Grobman of the security company McAfee said forensics ex- perts are looking at how the ransomware was written and how it was run. WannaCry is a sophistica­ted piece of work, he said, which helps rule out the possibilit­y it was released by mere pranksters or lower-level thieves.

As for anonymous bitcoin transactio­ns, he said, it is sometimes possible to follow them until an identifiab­le person is found.

So far, not many people have paid the ransom, said Jan Op Gen Oorth, a spokespers­on for Europol, the European police agency.

Eiichi Moriya, a cybersecur­ity expert and professor at Japan’s Meiji University, warned that paying the ransom would not guarantee a fix.

“You are dealing with a criminal,” he said. “It’s like after a robber enters your home. You can change the locks, but what has happened cannot be undone.”

In Britain, many hospitals and clinics that are part of the country’s National Health Service were still having computer problems. Patients have had to be turned away because their records were inaccessib­le.

In the U.S., where the effects haven’t appeared to be widespread, investigat­ors believe additional companies have been attacked but have not yet come forward to report it, a law enforcemen­t official told The Associated Press. The official was not authorized to speak publicly about the investigat­ion.

Experts urged organizati­ons and companies to immediatel­y update older Microsoft operating systems, such as Windows XP, with a patch released by the company.

Newspapers in English

Newspapers from Canada