Hacked? Microsoft Says Blame The Government

Hacked? Microsoft Says Blame The Government

Hacked? Microsoft Says Blame The Government

WannaCry ransomware has created turmoil across the world.

Then there's the US government, whose Windows hacking tools were leaked to the internet and got into the hands of cybercriminals.

The WannaCry outbreak is just more evidence of the severe threat posed by ransomware.

Avivah Litan, a cybersecurity analyst at Gartner, agreed that the government is "is negligent not doing a better job protecting companies", but added that it's not like "you can stop the US government from developing cybertools" that then work as intended.

"Technology companies owe their customers a reliable process for patching security vulnerabilities", he said.

Apple's Mac computers were not targeted by this ransomware attack so are clear.

He added: "This attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem".

Alex Abdo, a staff attorney at the Knight First Amendment Institute at Columbia University, said Microsoft and other software companies have strategically settled lawsuits that could lead to court rulings weakening their licensing agreements.

According to Microsoft's blog, older versions of Windows that are no longer supported by Microsoft were vulnerable, which includes Windows 8 and Windows XP, which the majority of NHS Trusts were running.

We know that Windows update notifications get in the way of our work, which is why many users disable it on their system. Use a reputable security software to prevent attacks in the future. The Reserve Bank of India has already directed banks to operate their ATM networks only after machines have received a Windows update to protect them from the rampant malware. Multiple backups also help.

However, if you do pay, you're only fueling the fire.

Mr. Wellsmore said Asia was likely spared the brunt of the attack because of the timing.

"They're going to turn on their computers in the morning and find out if they were protected or not" said James Barnett, a security expert at Venable. At least three companies and banks had paid up money in bitcoins to unlock their systems, said people familiar with the event.

Corporate world was back on its feet across the globe after more than 2 lakh computers were affected by the virus and the follow-up attack did not materialise as feared, said cyber security experts. According to Wikipedia, once installed, wannacry uses the EternalBlue exploit and DoublePulsar backdoor developed by the U.S. National Security Agency (NSA) to spread through local networks and remote hosts, which have not been updated with the most recent security updates yet, to directly infect any exposed systems. If they caught, that is.

Related news