Some businesses in Asia disrupted by
cyber attack, authorities brace for more
Send a link to a friend
[May 15, 2017]
By Jeremy Wagstaff and Dustin Volz
SINGAPORE/
WASHINGTON (Reuters) - Asian
governments and businesses reported some disruptions from the WannaCry
ransomware worm on Monday but cybersecurity experts warned of a wider
impact as more employees turned on their computers and checked e-mails.
In China, the world's second-largest economy, payment systems and
government services reported some outages from the ransomware attack,
but far less than feared. Disruptions were low in the rest of Asia,
including Japan, India, South Korea and Australia.
The WannaCry worm, which erupted on Friday, locked up hundreds of
thousands of computers in more than 150 countries, hitting factories,
hospitals, shops and schools worldwide.
While the effect on Asian entities on Monday was less severe than
anticipated, industry professionals flagged potential risks in the
future. Companies that were hit by the worm, which is spread mostly by
email, may be wary of making it public, they added.
"We're looking at (the) victims' profiles, we're still seeing a lot of
victims in the Asia-Pacific region. But it is a global campaign, it's
not targeted," said Tim Wellsmore, Director of Threat Intelligence, Asia
Pacific at cybersecurity firm FireEye Inc <FEYE.N>.

"But I don’t think we can say it hasn’t impacted this region to the
extent it has some other regions."
Michael Gazeley, managing director of Network Box, a Hong Kong-based
cybersecurity firm, said there were still "many 'landmines' waiting in
people's in-boxes" in the region, with most of the attacks having
arrived via e-mail.
However, financial markets in Asia were unfazed by news of the
cyberattack, with stocks mostly up across the region during the day.
In China, energy giant PetroChina <601857.SS> said payment systems at
some of its petrol stations were hit, although it had been able to
restore most of the systems. Several Chinese government bodies,
including police and traffic authorities, reported they had been
impacted by the hack, according to posts on official microblogs.
Chinese tech firm Qihoo 360 said the rate of infection on Monday had
slowed significantly from the past two days.
"Previous concerns of a wide-scale infection of domestic institutions
did not eventuate," the firm said.
Japan's National Police Agency reported two breaches of computers in the
country on Sunday - one at a hospital and the other case involving a
private person - but no loss of funds.
Industrial conglomerate Hitachi Ltd. <6501.T> said the attack had
affected its systems at some point over the weekend, leaving them unable
to receive and send e-mails or open attachments in some cases. The
problem is still ongoing, the company said.
In India, the government said it had only received a few reports of
attacks on systems and urged those hit not to pay attackers any ransom.
No major Indian corporations reported disruptions to operations.
BANKS ESCAPE
A spokesman for the Hong Kong Exchanges and Clearing, one of the
region's biggest bourses, said all systems were so far working normally.
"We remain highly vigilant," he said.

A cybersecurity researcher in Asia who declined to be named said that
while most banks globally had escaped damage, not all had installed
patches in time.
The result was that some phishing e-mails slipped through and were
activated by users, but were caught by other security systems in place.
At Indonesia’s biggest cancer hospital, Dharmais Hospital in Jakarta,
around 100-200 people packed waiting rooms after the institution was hit
by cyber attacks affecting scores of computers. By late morning, some
people were still filling out forms manually, but the hospital said 70
percent of systems were back online now.
[to top of second column] |

A general view of the Dharmais hospital in Jakarta, Indonesia May
14, 2017. REUTERS/Darren Whiteside

Elsewhere in the region, companies warned users and staff not to
click on attachments or links. One school in South Korea barred its
pupils from using the internet. Taiwan's government appeared to have
escaped major infection, possibly because regulations there require
all departments to install software updates as soon as they are
available.
South Korea's presidential Blue House office said nine cases of
ransomware were found in the country, but did not provide details on
where the cyber attacks were discovered.
In Australia, Dan Tehan, the government minister responsible for
cybersecurity, said just three businesses had been hit by the bug,
despite worries of widespread infection. There were no reported
cases in New Zealand.
Cyber security experts said the spread of the ransomware had slowed
since its appearance on Friday but that the respite might only be
brief.
For one thing, the attackers or copycat attackers may have developed
new versions of the worm, although a British-based security
researcher who thwarted an earlier version of the worm told Reuters
most of these reports had been proven false.
NEW VERSION
In Hong Kong, Gazeley said his team had found a new version of the
worm that didn't use e-mail to lure victims.
Instead, it loaded scripts onto hacked websites where users who
clicked on a malicious link would be infected directly. He said it
was too early to tell how many websites had been affected.
In a blog post on Sunday, Microsoft <MSFT.O> President Brad Smith
appeared to tacitly acknowledge what researchers had already widely
concluded: The ransomware attack leveraged a hacking tool built by
the U.S. National Security Agency that leaked online in April.

The non-profit U.S. Cyber Consequences Unit research institute
estimated that total losses would range in the hundreds of millions
of dollars, but not exceed $1 billion.
Infected computers appear to largely be out-of-date devices that
organizations deemed not worth the price of upgrading or, in some
cases, machines involved in manufacturing or hospital functions that
proved too difficult to patch without possibly disrupting crucial
operations, security experts said.
Microsoft released patches last month and on Friday to fix a
vulnerability that allowed the worm to spread across networks.
(Additional reporting by Jessica Yu in TAIPEI, Sam Nussey and Kaori
Kaneko in TOKYO, Michelle Price in HONG KONG, Samuel Shen and David
Stanway in SHANGHAI, Christine Kim in SEOUL, Engen Tham and Cate
Cadell in BEIJING, Byron Smith in Sydney, Ed Davies and Agustinus Da
Costa in JAKARTA, Euan Rocha in MUMBAI; Writing by Sam Holmes;
Editing by Raju Gopalakrishnan)
[© 2017 Thomson Reuters. All rights
reserved.]
Copyright 2017 Reuters. All rights reserved. This material may not be published,
broadcast, rewritten or redistributed.
 |