Global cyber attack hits hospitals and
companies, threat seen fading for now
Send a link to a friend
[May 13, 2017]
By Jeremy Wagstaff and Costas Pitas
SINGAPORE/LONDON (Reuters) - A global cyber
attack leveraging hacking tools believed to have been developed by the
U.S. National Security Agency has infected tens of thousands of
computers in nearly 100 countries, disrupting Britain's health system
and global shipper FedEx.
Cyber extortionists tricked victims into opening malicious malware
attachments to spam emails that appeared to contain invoices, job
offers, security warnings and other legitimate files.
The ransomware encrypted data on the computers, demanding payments of
$300 to $600 to restore access. Security researchers said they observed
some victims paying via the digital currency bitcoin, though they did
not know what percent had given in to the extortionists.
Researchers with security software maker Avast said they had observed
57,000 infections in 99 countries, with Russia, Ukraine and Taiwan the
top targets.
Some experts said the threat had receded for now, in part because a
British-based researcher, who declined to give his name, registered a
domain that he noticed the malware was trying to connect to, limiting
the worm's spread.
"We are on a downward slope, the infections are extremely few, because
the malware is not able to connect to the registered domain," said
Vikram Thakur, principal research manager at Symantec.
"The numbers are extremely low and coming down fast."
But the attackers may yet tweak the code and restart the cycle. The
British-based researcher who may have foiled the ransomware's spread
told Reuters he had not seen any such tweaks yet, "but they will."
Finance chiefs from the Group of Seven rich countries will commit on
Saturday to join forces to fight the growing threat of international
cyber attacks, according to a draft statement of a meeting they are
holding in Italy.
"Appropriate economy-wide policy responses are needed," the ministers
said in their draft statement, seen by Reuters.
HOSPITALS IN FIRING LINE
In Asia, some hospitals, schools, universities and other institutions
were affected, although the full extent of the damage is not yet known
because it is the weekend.
"I believe many companies have not yet noticed," said William Saito, a
cyber security adviser to Japan's government.
"Things could likely emerge on Monday."
China's official Xinhua news agency said some secondary schools and
universities had been affected, without specifying how many or
identifying them.
In Vietnam, Vu Ngoc Son, a director of Bkav Anti Malware, said dozens of
cases of infection had been reported there, but he declined to identify
any of the victims.
South Korea’s Yonhap news agency reported a university hospital had been
affected, while a communications official in Indonesia said two
hospitals there had been affected.
The most disruptive attacks were reported in Britain, where hospitals
and clinics were forced to turn away patients after losing access to
computers on Friday.
International shipper FedEx Corp said some of its Windows computers were
also infected. "We are implementing remediation steps as quickly as
possible," it said in a statement.
Telecommunications company Telefonica was among many targets in Spain.
Portugal Telecom and Telefonica Argentina both said they were also
targeted.
Only a small number of U.S.-headquartered organizations were hit because
the hackers appear to have begun the campaign by targeting organizations
in Europe, said Thakur.
By the time they turned their attention to the United States, spam
filters had identified the new threat and flagged the ransomware-laden
emails as malicious, Thakur added.
MICROSOFT UPS DEFENSES
The U.S. Department of Homeland Security said it was sharing information
with domestic and foreign partners and was ready to lend technical
support.
[to top of second column] |
An ambulance waits outside the emergency department at St Thomas'
Hospital in central London, Britain May 12, 2017. REUTERS/Stefan
Wermuth
Private security firms identified the ransomware as a new variant of
"WannaCry" that had the ability to automatically spread across large
networks by exploiting a known bug in Microsoft's Windows operating
system.
The hackers, who have not come forward to claim responsibility or
otherwise been identified, likely made it a "worm", or self
spreading malware, by exploiting a piece of NSA code known as
"Eternal Blue" that was released last month by a group known as the
Shadow Brokers, researchers with several private cyber security
firms said.
"This is one of the largest global ransomware attacks the cyber
community has ever seen," said Rich Barger, director of threat
research with Splunk, one of the firms that linked WannaCry to the
NSA.
The Shadow Brokers released Eternal Blue as part of a trove of
hacking tools that they said belonged to the U.S. spy agency.
Microsoft said it was pushing out automatic Windows updates to
defend clients from WannaCry. It issued a patch on March 14 to
protect them from Eternal Blue.
"Today our engineers added detection and protection against new
malicious software known as Ransom:Win32.WannaCrypt," Microsoft said
in a statement on Friday, adding it was working with customers to
provide additional assistance.
SENSITIVE TIMING
The spread of the ransomware capped a week of cyber turmoil in
Europe that began the previous week when hackers posted a trove of
campaign documents tied to French candidate Emmanuel Macron just
before a run-off vote in which he was elected president of France.
On Wednesday, hackers disrupted the websites of several French media
companies and aerospace giant Airbus.The hack happened four weeks
before a British general election in which national security and the
management of the state-run National Health Service are important
issues.
The British government did not know who was behind the attack but
its National Crime Agency was working to find out, interior minister
Amber Rudd said.
Authorities in Britain have been braced for cyber attacks in the
run-up to the election, as happened during last year's U.S. election
and on the eve of the French one.
But those attacks - blamed on Russia, which has repeatedly denied
them - followed a different modus operandi involving penetrating the
accounts of individuals and political organizations and then
releasing hacked material online.
On Friday, Russia's interior and emergencies ministries, as well as
its biggest bank, Sberbank, said they were targeted. The interior
ministry said about 1,000 computers had been infected but it had
localized the virus.
Although cyber extortion cases have been rising for several years,
they have to date affected small-to-mid sized organizations.
"Seeing a large telco like Telefonica get hit is going to get
everybody worried," said Chris Wysopal, chief technology officer
with cyber security firm Veracode.
(Additional reporting by Kiyoshi Takenaka, Jim Finkle, Eric Auchard,
Jose Rodriguez, Alistair Smout, Andrea Shalal, Jack Stubbs,
Antonella Cinelli, Dustin Volz, Kate Holton, Andy Bruce, Michael
Holden, David Milliken, Rosalba O'Brien, Julien Toyer, Tim Hepher,
Luiza Ilie, Patricia Rua, Axel Bugge, Sabine Siebold and Eric Walsh,
Engen Tham, Fransiska Nangoy, Soyoung Kim, Mai Nguyen; Editing by
Rob Birsel and Mike Collett-White)
[© 2017 Thomson Reuters. All rights
reserved.]
Copyright 2017 Reuters. All rights reserved. This material may not be published,
broadcast, rewritten or redistributed.
|