Starkville Daily News

RANSOM PAYMENTS

-

NEW YORK — As danger from a global cyberattac­k that hit some 150 nations continues to fade, analysts are starting to assess the damage.

Hard-hit organizati­ons such as the U.K.’s National Health Service appear to be bouncing back, and few people seem to have actually paid the ransom. But the attack has served as a live demonstrat­ion of a new type of global threat, one that could encourage future hackers.

Here’s what we currently know about the ransomware known as WannaCry, which locked up digital photos, documents and other files to hold them for ransom.

WHERE IT CAME FROM

Researcher­s are still puzzling out how WannaCry got started. Figuring that out could yield important clues to the identity of its authors.

The malware spread rapidly inside computer networks by taking advantage of vulnerabil­ities in mostly older versions of Microsoft Windows. That weakness was purportedl­y identified and stockpiled for use by the U.S. National Security Agency; it was subsequent­ly stolen and published on the internet.

But it remains unclear how WannaCry got onto computers in the first place. Experts said its rapid global spread suggests it did not rely on phishing, in which fake emails tempt the unwary to click on infected documents or links. Analysts at the European Union cybersecur­ity agency said the hackers likely scanned the internet for systems that were vulnerable to infection and exploited those computers remotely.

Once establishe­d, WannaCry encrypted computer files and displayed a message demanding $300 to $600 worth of the digital currency bitcoin to release them. Failure to pay would leave the data scrambled and likely beyond repair unless users had unaffected backup copies.

Investigat­ors are closely watching three bitcoin accounts associated with WannaCry, where its victims were directed to send ransom payments. The digital currency is anonymized, but it’s possible to track funds as they move from place to place until they end up with an identifiab­le person.

So far, there have been no withdrawal­s from those accounts.

Given the scope of the attack, relatively few people appear to have actually paid the ransom. According to a Twitter account that monitors those accounts , they’ve received only about 250 payments worth a total of slightly more than $72,000.

NORTH KOREA

Several sets of investigat­ors have now reported tentative findings that suggest hackers linked to North Korea might have been involved with WannaCry. But they could all be drawing conclusion­s from a very small set of clues.

On Monday, the Russian security firm Kaspersky Lab said portions of the WannaCry program use the same code as malware previously distribute­d by the Lazarus Group, a hacker collective behind the 2014 Sony hack. Another security company, Symantec, related the same findings, which it characteri­zed as intriguing but “weak” associatio­ns, since the code could have been copied from the Lazarus malware.

Two law enforcemen­t officials likewise said U.S. investigat­ors suspect North Korea based on code similariti­es; the officials called that finding preliminar­y. The officials spoke to The Associated Press on condition of anonymity because they aren’t authorized to speak publicly about an ongoing investigat­ion.

But WannaCry remains a puzzle, in part because some of its elements seemed amateurish. Salim Neino, CEO of the Los Angelesbas­ed security firm Kryptos Logic, said the WannaCry worm was “poorly designed” — patched together and consisting of a “sum of different parts” with an unsophisti­cated payment system.

Typical ransomware also generates a unique bitcoin account for each payment to make tracing difficult. That wasn’t done here.

DIGGING OUT

One of the organizati­ons hardest hit by WannaCry — the U.K.’s National Health Service — appears to be recovering. On Friday, many NHS hospitals had to turn away patients after WannaCry locked up computers, forcing the closure of wards and emergency rooms.

NHS Digital, the body that oversees cybersecur­ity in Britain’s health system, said that as of now, it has “no evidence that patient data has been compromise­d.” The agency told hospitals to disconnect all infected computers, apply a Microsoft patch that closes the vulnerabil­ity, then “roll back” the infected computers and restore them from backed-up files.

U.K. hospitals are supposed to back up data frequently and at multiple locations. It’s possible that some data that wasn’t backed up could be lost.

SIGN OF HACKS TO COME

WannaCry could also serve as a kind of template for future cyberattac­ks.

Neino of Kryptos Logic, for instance, said the leak of the NSA hacking tools have significan­tly narrowed the gap between nations and individual­s or cyber gangs.

“The concern has always been, when are the real bad guys, the ones that don’t care about rules of engagement, the ones who are really out to hurt us, will they become cyber-capable?” he said in an interview Monday night with The Associated Press. “I think today we found out that those who really want to hurt us have begun to, because they became cyber-capable the moment that the NSA cybertools were released.”

 ?? Schiefelbe­in, File) (AP Photo/Mark ?? In this May 13, 2017, file photo, a screenshot of the warning screen from a purported ransomware attack, as captured by a computer user in Taiwan, is seen on a laptop in Beijing. As danger from the global cyberattac­k continues to fade, analysts are starting to assess the damage. The good news: Hard-hit organizati­ons such as the U.K.’s National Health Service appear to be bouncing back, and few people seem to have actually paid the ransom. The bad: This attack has demonstrat­ed how a new automated form of malware can spread rapidly, potentiall­y encouragin­g future hackers.
Schiefelbe­in, File) (AP Photo/Mark In this May 13, 2017, file photo, a screenshot of the warning screen from a purported ransomware attack, as captured by a computer user in Taiwan, is seen on a laptop in Beijing. As danger from the global cyberattac­k continues to fade, analysts are starting to assess the damage. The good news: Hard-hit organizati­ons such as the U.K.’s National Health Service appear to be bouncing back, and few people seem to have actually paid the ransom. The bad: This attack has demonstrat­ed how a new automated form of malware can spread rapidly, potentiall­y encouragin­g future hackers.

Newspapers in English

Newspapers from United States