Advertisement

We need your help now

Support from readers like you keeps The Journal open.

You are visiting us because we have something you value. Independent, unbiased news that tells the truth. Advertising revenue goes some way to support our mission, but this year it has not been enough.

If you've seen value in our reporting, please contribute what you can, so we can continue to produce accurate and meaningful journalism. For everyone who needs it.

Dominic Lipinski

Cyberattack that has swept the world was 'aimed at Ukraine'

People were urged to be wary of clicking on email attachments or shared links.

A GLOBAL WAVE of cyberattacks which exploited an already patched vulnerability in Windows software and appeared to have Ukraine as a primary target, according to computer security specialists.

The first reports of trouble came from Ukrainian banks, Kiev’s main airport and Rosneft, in a major incident reminiscent of the recent WannaCry virus.

WannaCry was a version of ransomware that, once in a computer, locked away data from users who were then told to pay to have access returned to their own files.

The bedeviling onslaught was also being referred to as ransomware by US software titan Microsoft and security specialists.

“Our initial analysis found that the ransomware uses multiple techniques to spread, including one which was addressed by a security update previously provided for all platforms from Windows XP to Windows 10 (MS17-010),” a Microsoft spokesperson told AFP.

After the WannaCry scourge in May, Microsoft called on people to protect machines with the MS17-010 patch.

The flaw — and the means to exploit it — had previously been disclosed in pirated documents about cyber weapons at the US National Security Agency.

Microsoft said that its anti-virus software detects and removes the ransomware used in the latest attack.

Microsoft is continuing to investigate the latest cyberattack and will take necessary steps to protect customers, the spokesperson said.

Beware

People were also urged to be wary of clicking on email attachments or shared links, since that is a common trick used to unleash malicious code on computers.

“As ransomware also typically spreads via email, customers should exercise caution when opening unknown files,” the Microsoft spokesperson said.

Identification of the way the latest ransomware initially got into machines was proving challenging, and the use of email was not confirmed, according to a post by Cisco Talos threat intelligence.

“Based on observed in-the-wild behaviors, the lack of a known, viable external spreading mechanism and other research we believe it is possible that some infections may be associated with software update systems for a Ukrainian tax accounting package called MeDoc,” Cisco Talos wrote.

Ukraine’s central bank said several lenders had been hit in the country, hindering operations and leading the regulator to warn other financial institutions to tighten security measures.

The virus is “spreading around the world, a large number of countries are affected,” Costin Raiu, a researcher at the Moscow-based Kaspersky Lab said in a Twitter post.

The cryptolocker demands $300 in bitcoins and does not name the encrypting program, which makes finding a solution difficult, Group IB spokesman Evgeny Gukov said.

© AFP 2017

Read: Helicopter hurls grenades at Venezuela Supreme Court as violence escalates

Author
View 18 comments
Close
18 Comments
    Submit a report
    Please help us understand how this comment violates our community guidelines.
    Thank you for the feedback
    Your feedback has been sent to our team for review.
    JournalTv
    News in 60 seconds