Government seeks answers on cyber-attack

Francis Osborne
May 16, 2017

A global ransomware attack struck hospitals, companies and government offices Friday and now cyber security experts fear more businesses may find they have been hacked come Monday.

"The ransomware also spreads through malicious attachments to emails", it said. To learn more about ensuring safety from such type of attack, MacGibbon said people must visit the Australian Cyber Security Centre. The game's website was working Sunday, but the game has been shut down until the owners can recover from the attack. Omer Fatih Sayan said the country's cyber security center is continuing operations against the malicious software.

The attacks exploit a vulnerability in outdated versions of Microsoft Windows that is particularly problematic for corporations that don't automatically update their systems.

Fellow security researcher Darien Huss, from tech firm Proofpoint, echoed MalwareTech's view.

Security firm Digital Shadows said on Sunday that transactions totalling US$32,000 had taken place through Bitcoin addresses used by the ransomware.

"B$3 ecause WannaCrypt used a single hardcoded domain, my registartion [sic] of it caused all infections globally to believe they were inside a sandbox and exit.thus we initially unintentionally prevented the spread and and further ransoming of computers infected with this malware".

The head of the pan-European Union policing agency said that few had given in to the demands for payment to unblock files so far, but warned that the situation was escalating. But he said the country was safe from the major impacts of the attack, which was believed to be the same thing as the one that reached thousands of computer systems in the United Kingdom in an extortion plot. Normally, such patches are reserved for organisations willing to pay for extended support.

Update your antivirus software.

Russia: Syria deal bans US-led coalition aircraft
It also called on the USA and other Arab allied countries, to take "firm stances" to prevent the implementation of the deal. The Syrian regime supported the de-escalation plan, but said it would continue to fight what it termed terrorist groups.


Experts were scrambling to determine who was behind the attack, which exploited a security flaw in older versions of Microsoft's Windows operating software.

Officials are working to determine what level of exposure New Zealanders have had to a powerful cyber attack that has swept the world.

This is the first warning most people and companies receive - when they try to call and use a document or file.

The 22-year-old British cyber researcher who found the kill switch said he was now looking into a possible second wave of attacks. The server operates as a "sinkhole" to collect information about malware - and in Friday's case kept the malware from escaping.

UK Home Secretary Amber Rudd said on Saturday that the problem was largely resolved but that "there's always more" that could be done to protect against computer viruses. Short of paying, options for those already infected are usually limited to recovering data files from a backup, if available, or living without them.

The software tools to create the attack were revealed in April among a trove of NSA spy tools that were either leaked or stolen. Cybersecurity experts have said the majority of the attacks targeted Russia, Ukraine and Taiwan.

He added that it was too early to say who was behind the attack and what their motivation was, but the main challenge was how quickly the virus could spread.

Other reports by TheDailyFarc

Discuss This Article

FOLLOW OUR NEWSPAPER