This article is from the source 'nytimes' and was first published or seen on . It last changed over 40 days ago and won't be checked again for changes.

You can find the current article at its original source at https://www.nytimes.com/2017/05/14/world/europe/cyberattacks-hack-computers-monday.html

The article has changed 15 times. There is an RSS feed of changes available.

Version 1 Version 2
Cyberattack’s Impact Could Worsen as Computers Are Turned On Monday Cyberattack’s Impact Could Worsen as Computers Are Turned On Monday
(35 minutes later)
LONDON — Security experts warned that the global cyberattack that began on Friday might be magnified in the new workweek as users return to their offices and turn on their computers. LONDON — Security experts are warning that the global cyberattack that began on Friday is likely to be magnified in the new workweek as users return to their offices and turn on their computers.
Many workers, particularly in Asia, had already logged off on Friday when the malicious software, stolen from the United States government, began proliferating across computer systems around the world. So the true impact of the attack may emerge on Monday as employees return and log in.Many workers, particularly in Asia, had already logged off on Friday when the malicious software, stolen from the United States government, began proliferating across computer systems around the world. So the true impact of the attack may emerge on Monday as employees return and log in.
Moreover, copycat variants of the malicious software behind the attacks are likely to spread, since the malware is mostly open sourced and easily replicable. Moreover, copycat variants of the malicious software behind the attacks are likely to spread, since the malware uses mostly open-source code and is easily replicable.
Rob Wainwright, the executive director of Europol, said on Sunday that the attacks had hit 200,000 computers in more than 150 countries. He warned that the attacks were escalating, and could worsen. Rob Wainwright, the executive director of Europol, the European Union’s police agency, said on Sunday that the attacks had hit 200,000 computers in more than 150 countries.
“At the moment, we are in the face of an escalating threat,” he told the British network ITV on Sunday. “The numbers are going up. I am worried about how the numbers will continue to grow when people go to work and turn their machines on Monday morning.”“At the moment, we are in the face of an escalating threat,” he told the British network ITV on Sunday. “The numbers are going up. I am worried about how the numbers will continue to grow when people go to work and turn their machines on Monday morning.”
Among the organizations hit were FedEx in the United States, the Spanish telecom giant Telefónica, the French automaker Renault, universities in China, Germany’s federal railway system and Russia’s powerful Interior Ministry. The most disruptive attacks infected Britain’s public health system, where surgeries had to be rescheduled and some patients were turned away from emergency rooms.Among the organizations hit were FedEx in the United States, the Spanish telecom giant Telefónica, the French automaker Renault, universities in China, Germany’s federal railway system and Russia’s powerful Interior Ministry. The most disruptive attacks infected Britain’s public health system, where surgeries had to be rescheduled and some patients were turned away from emergency rooms.
Officials and experts warn that worse cyberattacks may be yet to come.
“We haven’t seen spikes of new attacks yet, but that’s a strong likelihood,” said Matthieu Suiche, founder of Comae Technologies, a cybersecurity company based in the United Arab Emirates. “We could see more attacks if people start to copycat this attack,” he added.“We haven’t seen spikes of new attacks yet, but that’s a strong likelihood,” said Matthieu Suiche, founder of Comae Technologies, a cybersecurity company based in the United Arab Emirates. “We could see more attacks if people start to copycat this attack,” he added.
A 22-year-old British researcher who uses the Twitter name MalwareTech has been credited with accidentally helping to stanch the spread of the assault by identifying the web domain for the hackers’ “kill switch” — a way of disabling the malware. A 22-year-old British researcher who uses the Twitter name MalwareTech has been credited with inadvertently helping to stanch the spread of the assault by identifying the web domain for the hackers’ “kill switch” — a way of disabling the malware.
On Sunday, MalwareTech was one of the many security experts warning that a less-vulnerable version of the malware is likely to be released. On Twitter, he urged users to immediately install a security patch for older versions of Microsoft’s Windows, including Windows XP. (The attack did not target Windows 10.) On Sunday, MalwareTech was one of many security experts warning that a less-vulnerable version of the malware is likely to be released. On Twitter, he urged users to immediately install a security patch for older versions of Microsoft’s Windows, including Windows XP. (The attack did not target Windows 10.)
Robert Pritchard, a former cybersecurity expert at Britain’s defense ministry, said that security specialists may not be able to keep pace with the hackers.Robert Pritchard, a former cybersecurity expert at Britain’s defense ministry, said that security specialists may not be able to keep pace with the hackers.
“This vulnerability still exits, other people are bound to exploit it,” he said. “The current variant will make its way into antivirus software. But what about any new variants that will come in the future?”“This vulnerability still exits, other people are bound to exploit it,” he said. “The current variant will make its way into antivirus software. But what about any new variants that will come in the future?”
All it would take is for a new group of hackers to change the original malware code slightly to remove the “kill switch” and send it off into the world, using the same email-based methods to infiltrate computer systems that the original attackers used, experts said. The Microsoft patch will help, but it will take time to installs across large organizations. All it would take is for a new group of hackers to change the original malware code slightly to remove the “kill switch” and send it off into the world, using the same email-based methods to infiltrate computer systems that the original attackers used, experts said. The Microsoft patch will help, but it will take time to install across large organizations.
Governments around the world are bracing themselves for the start of the workweek. Governments around the world were bracing themselves for the start of the workweek.
“This is crucial for businesses when reopening on Monday: Please beware and anticipate, and take preventive steps against the WannaCry malware attack,” Indonesia’s communication and information minister, Rudiantara, who like many Indonesians uses only one name, said at a news conference.“This is crucial for businesses when reopening on Monday: Please beware and anticipate, and take preventive steps against the WannaCry malware attack,” Indonesia’s communication and information minister, Rudiantara, who like many Indonesians uses only one name, said at a news conference.
He advised those hit by the malware against paying the $300 to $600 in Bitcoin demanded as ransom to regain access to encrypted data, since there was no assurance that the extortionists would decrypt the files as promised.He advised those hit by the malware against paying the $300 to $600 in Bitcoin demanded as ransom to regain access to encrypted data, since there was no assurance that the extortionists would decrypt the files as promised.
At least one hospital, Dharmais Hospital in Jakarta, was affected, according to Abdul Kadir, the hospital director. He said that the computer system was struck early on Saturday, but that it had not affected patient care. At least one Indonesian hospital, Dharmais Hospital in Jakarta, was affected. Abdul Kadir, the hospital director, said in an interview that the computer system was struck early on Saturday, but that it had not affected patient care.
In China, The Beijing News reported that students at several universities were blocked from gaining access to their theses and dissertations. In China, several universities reported malware problems, including Shandong University in the northeast, which urged faculty and students to update their software as quickly as possible.
In Britain, the fallout from the attack continued. The opposition Labour and Liberal Democrat Parties have criticized the Conservative Party, which has been in power since 2010, and said it did not do more to prevent the attack. With a general election scheduled for June 8, officials have been racing to get ahead of the problem. “There is often no other way to decrypt the file, except to pay a high ransom to decrypt and recover the documents, learning materials and personal data,” the notice warned on Saturday.
Microsoft has complained for years that the large majority of computers running its software were using pirated versions. The spread of hacking attacks has made legal versions of software more popular, as they typically provide automatic updates of security upgrades.
But Edward J. Snowden’s release in 2013 of extensive information about hacking by the United States government, some of it aimed at monitoring China’s rapid military buildup, alarmed the Chinese leadership. The leak by Mr. Snowden, a former National Security Agency contractor, helped accelerate a broad push to develop Chinese-brand software and hardware that would be hard for Western intelligence agencies to penetrate but that would still allow monitoring of the population by Chinese security agencies.
In Britain, the fallout from the attack continued on Sunday. Two opposition parties, the Labour Party and the Liberal Democrats, asserted that the governing Conservative Party had not done enough to prevent the attack. With a general election scheduled for June 8, officials have been racing to get ahead of the problem.
Britain’s defense minister, Michael Fallon, told the BBC on Sunday that the government was spending about 50 million pounds ($64 million) to improve cybersecurity at the National Health Service, where many computers still run the outdated Windows XP software, which Microsoft had stopped supporting.Britain’s defense minister, Michael Fallon, told the BBC on Sunday that the government was spending about 50 million pounds ($64 million) to improve cybersecurity at the National Health Service, where many computers still run the outdated Windows XP software, which Microsoft had stopped supporting.
Mr. Fallon said that cyberattacks were one of the three greatest security threats for the country. At the National Health Service, employees said they had been cautioned about their computer use.
Oliver Gower, deputy director of the National Cyber Crime Unit at Britain’s National Crime Agency, said in a statement that it was cooperating with its counterparts around the world.
“This was a large-scale attack, but we are working closely with law enforcement partners and industry experts in the U.K. and overseas to support victims and identify the perpetrators,” he said. “Cybercriminals may believe they are anonymous, but we will use all the tools at our disposal to bring them to justice.”
At the National Health Servicee, employees said they had been cautioned about their computer use.
“We are all being extra careful,” said Greg Elston, a paramedic at St. Mary’s Hospital in central London. “We’ve been instructed not to open email attachments on our phones.”“We are all being extra careful,” said Greg Elston, a paramedic at St. Mary’s Hospital in central London. “We’ve been instructed not to open email attachments on our phones.”
Nancy Harper, who accompanied her mother to the hospital on Saturday for an X-ray, said: “It’s concerning that the N.H.S. was dependent on these outdated systems. If your average person has access to cheap cloud storage these days, then hospitals should be using similar backup methods. I hope this was a wake-up call.”Nancy Harper, who accompanied her mother to the hospital on Saturday for an X-ray, said: “It’s concerning that the N.H.S. was dependent on these outdated systems. If your average person has access to cheap cloud storage these days, then hospitals should be using similar backup methods. I hope this was a wake-up call.”
Others praised the service for maintaining services despite the strain. Himmat Sandut, who took his mother to the emergency room after she collapsed at home, said his experience had been smooth and fast.Others praised the service for maintaining services despite the strain. Himmat Sandut, who took his mother to the emergency room after she collapsed at home, said his experience had been smooth and fast.
“I was worried we would be faced with a huge queue, but we were seen within 10 minutes, and they’ve now given my mum a bed,” he said on Saturday. “I’m surprised and impressed under the current circumstances.”“I was worried we would be faced with a huge queue, but we were seen within 10 minutes, and they’ve now given my mum a bed,” he said on Saturday. “I’m surprised and impressed under the current circumstances.”
The least-functioning part of the hospital appeared to be the elevator, which got stuck on Saturday before resuming operations — in the wrong direction.The least-functioning part of the hospital appeared to be the elevator, which got stuck on Saturday before resuming operations — in the wrong direction.
“Was the elevator hacked as well?” one man said jokingly, causing an elevator packed with tense doctors and nurses to erupt in laughter. “Are we going to have to pay a ransom to get out?”“Was the elevator hacked as well?” one man said jokingly, causing an elevator packed with tense doctors and nurses to erupt in laughter. “Are we going to have to pay a ransom to get out?”