Thousands of ransomware cyberattacks reported worldwide
A ransomware virus is reported to be spreading aggressively around the globe, with over 50,000 computers having been targeted. The virus infects computer files and then demands money to unblock them.

An increase in activity of the malware was noticed starting from 8am CET (07:00 GMT) Friday, security software company Avast reported, adding that it “quickly escalated into a massive spreading.”

In a matter of hours, over 57,000 attacks have been detected worldwide, the company said.

57,000 detections of (aka aka ) by Avast today. More details in blog post: https://blog.avast.com/ransomware-that-infected-telefonica-and-hns-hospitals-is-spreading-aggressively-with-over-50000-attacks-so-far-today 

Photo published for Ransomware that infected Telefonica and HNS hospitals is spreading aggressively, with over 50,000...

Ransomware that infected Telefonica and HNS hospitals is spreading aggressively, with over 50,000…

Avast reports on WanaCrypt0r 2.0 ransomware that infected NHS and Telefonica.

blog.avast.com

Seventy-four countries around the globe have been affected, with the number of victims still growing, according to the Russian multinational cybersecurity and anti-virus provider, the Kaspersky Lab.

So far, we have recorded more than 45,000 attacks of the ransomware in 74 countries around the world. Number still growing fast.

The ransomware, known as WanaCrypt0r 2.0, or WannaCry, is believed to have infected National Health Service (NHS) hospitals in the UK and Spain’s biggest national telecommunications firm, Telefonica.

Britain and Spain are among the first nations who have officially recognized the attack. In Spain, apart from the telecommunications giant, Telefonica, a large number of other companies has been infected with the malicious software, Reuters reported.

The virus is said to attack computers on an internal network, as is the case with Telefonica, without affecting clients.

Attackers are allegedly demanding for 300Ƀ which equals £415k & give a deadline of May 19: https://on.rt.com/8bgz 

Computers at Russia’s Interior Ministry have been infected with the malware, the ministry said Friday evening.

Some 1,000 Windows-operated PCs were affected, which is less than one percent of the total number of such computers in the ministry, spokeswoman Irina Volk said in a statement.

The virus has been localized and steps are being taken to eliminate it.

The servers of the ministry have not been affected, Volk added, saying it’s operated by different systems for Russia-developed data processing machines.

Several” computers of Russia’s Emergency Ministry had also been targeted, its representative told TASS, adding, that “all of the attempted attacks had been blocked, and none of the computers were infected with the virus.”

Russian telecom giant, Megafon has also been affected.

The very virus that is spreading worldwide and demanding $300 to be dealt with has been found on a large number of our computers in the second half of the day today,” Megafon’s spokesperson Pyotr Lidov told RT.

Вот что появилось на экранах всех рабочих компьютеров Мегафон Ритейл @eldarmurtazin

The internal network had been affected, he said, adding that in terms of the company’s customer services, the work of the support team had been temporarily hindered, “as operators use computers” to provide their services.

The company immediately took appropriate measures, the spokesperson said, adding that the incident didn’t affect subscribers’ devices or Megafon signal capabilities in any way.

British Prime Minister Theresa May has said the cyberattack on UK hospitals is part of a wider international attack.

In Sweden, the mayor of Timra said “around 70 computers have had a dangerous code installed,” Reuters reported.

According to Avast, the ransomware has also targeted Ukraine and Taiwan.

The virus is apparently the upgraded version of the ransomware that first appeared in February. Believed to be affecting only Windows operated computers, it changes the affected file extension names to “.WNCRY.”

It then drops ransom notes to a user in a text file, demanding $300 worth of bitcoins to be paid to unlock the infected files within a certain period of time.

While the victim’s wallpaper is being changed, affected users also see a countdown timer to remind them of the limited time they have to pay the ransom. If they fail to pay, their data will be deleted, cybercriminals warn.

According to the New York Times, citing security experts, the ransomware exploits a “vulnerability that was discovered and developed by the National Security Agency (NSA).” The hacking tool was leaked by a group calling itself the Shadow Brokers, the report said, adding, that it has been distributing the stolen NSA hacking tools online since last year.

In light of today’s attack, Congress needs to be asking @NSAgov if it knows of any other vulnerabilities in software used in our hospitals.

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s