Log in, look out: Cyberattack havoc may grow at week's start

LONDON (AP) — An unprecedented "ransomware" cyberattack that has already hit tens of thousands of victims in 150 countries could wreak greater havoc as more malicious variations appear and people return to their desks Monday and power up computers at the start of the workweek.

As a loose global network of cybersecurity experts fought a rearguard battle against ransomware hackers, officials and experts on Sunday urged organizations and companies to update operating systems immediately to ensure they aren't vulnerable to a second, more powerful version of the software — or to future versions that can't be stopped.

The initial ransomware attack, known as "WannaCry," paralyzed computers that run Britain's hospital network, Germany's national railway and scores of other companies and government agencies worldwide in what was believed to be the biggest online extortion scheme ever recorded.

It hit 200,000 victims across the world since Friday and is seen as an "escalating threat," said Rob Wainwright, the head of Europol, Europe's policing agency.

"The numbers are still going up," Wainwright said. "We've seen that the slowdown of the infection rate over Friday night, after a temporary fix around it, has now been overcome by a second variation the criminals have released."

At least two variants of the rapidly replicating worm were discovered Sunday and one did not include the so-called kill switch that allowed researchers to interrupt its spread by diverting it to a dead end on the internet.

Ryan Kalember, senior vice president at Proofpoint Inc. which helped stop its spread, said the version without a kill switch was able to spread but it contained a flaw that wouldn't allow it to take over a computer and demand ransom to unlock files. However, he said it's only a matter of time before a malevolent version exists.

"I still expect another to pop up and be fully operational," Kalember said. "We haven't fully dodged this bullet at all until we're patched against the vulnerability itself."

The attack held users hostage by freezing their computers, encrypting their data and demanding money through online bitcoin payment — $300 at first, rising to $600 before it destroys files hours later.

It was too early to say who was behind the onslaught, which struck 100,000 organizations, and what their motivation was, aside from the obvious demand for money. So far, not many people have paid the ransom demanded by the malware, Europol spokesman Jan Op Gen Oorth told The Associated Press.

The effects were felt around the globe, disrupting computers that run factories, banks, government agencies and transport systems in nations as diverse as Russia, Ukraine, Brazil, Spain, India and the U.S. Britain's National Health Service was hit hard, while Russia's Interior Ministry and companies including Spain's Telefonica, FedEx Corp. in the U.S. and French carmaker Renault all reported disruptions.

Chinese media reported Sunday that students at several universities were hit, blocking access to their thesis papers and dissertation presentations.

The full extent of the attack won't become fully clear until Monday, when millions of workers return to the office for the first time after the attacks. By going online, they will open more avenues to spread the malicious software.

"It's this constant battle," Ryan O'Leary, vice president of WhiteHat Security's threat research center, said. "The bad guys are always one step ahead."

Researchers who helped prevent the spread of the malware and cybersecurity firms madly worked around the clock during the weekend to monitor the situation and install a software patch in corporations across the U.S., Europe and Asia that would block the worm from infecting computers.

"Right now, just about every IT department has been working all weekend rolling this out," Dan Wire, spokesman at Fireeye Security, said.

Businesses, government agencies and other organizations were urged to quickly implement a patch released by Microsoft Corp. The ransomware exploits older versions of Microsoft's operating system software, such as Windows XP.

Installing the patch is one way to secure computers against the virus. The other is to disable a type of software that connects computers to printers and faxes, which the virus exploits, O'Leary added.

Microsoft distributed a patch that could have forestalled much of the attack, but in many organizations it was likely lost among the blizzard of updates and patches that large corporate and government IT departments strain to manage.

"It's one of those things, in a perfect world, if people were up to date on the patches, this wouldn't be a problem," O'Leary said. "But there are so many things to patch. The patch lists can be ginormous. It can be tough to tell which patch is important, until it is too late."

Installing a patch can potentially require rebooting computers and therefore can be disruptive, O'Leary said. As a result, many IT departments delay installing patches until it is clearer what is important.

___

Associated Press writer Sylvia Hui reported this story in London and AP writer Christopher S. Rugaber reported from Washington. AP writers Brian Melley in Los Angeles, Allen G. Breed from Raleigh, North Carolina and AP Technology Writer Anick Jesdanun in New York contributed to this report.

 

Reader Comments(0)