Kill switch triggered
WannaCrypt is more damaging than previous malware attacks in part because it exploits a Windows security flaw that was only patched in March, meaning many large organisations haven’t yet been able to roll out Microsoft’s fix.
The malware also differs from previous strains in that it automatically scans the network for other vulnerable systems and infects them as well, researchers have said.
The data on infected systems is encrypted and users are asked to pay about $300 in Bitcoin to unlock them.
Researchers said on Sunday a variant called Uiwix without a kill switch had already been released, but officials said a feared second wave of disruption as the week began hadn’t materialised.
Home secretary Amber Rudd, who chaired a Cabinet Office meeting on Monday on computer security, said the UK is working with international organisations to track down WannaCrypt’s creators.
“The National Cyber Security Centre (NCSC) and the National Crime Agency (NCA) are working with Europol and other international partners to make sure that we all collect the right evidence, which we need to do, to make sure we have the right material to find out who has done this and go after them, which we will,” she said.
Do you know all about security in 2017? Try our quiz!
Page: 1 2
Semiconductor imports are free of Trump's tariff war, but concerns remain over imports of smartphones…
SoftBank has agreed a funding deal that will see OpenAI being provided with up to…
Tesla sales have plummeted to lowest level in three years, as deliveries of new EVs…
New addition. Next generation foundation model, as Amazon Nova model launches to perform actions within…
Head of artificial intelligence research at Meta Platforms has announced she is leaving the social…
No decision yet, after media reports CK Hutchison was to spin off its global telecom…