Thursday, March 28, 2024 | Ramadan 17, 1445 H
broken clouds
weather
OMAN
23°C / 23°C
EDITOR IN CHIEF- ABDULLAH BIN SALIM AL SHUEILI

Businesses bolster cyber defences for new ransomware attacks

1010854
1010854
minus
plus

By Jim Finkle and Eric Auchard — Businesses around the world scrambled on Saturday to prepare for a renewed cyber attack, convinced that a lull in a computer offensive that has stopped car factories, hospitals, schools and other organisations in around 100 countries was only temporary.


The pace of the attack by a destructive virus dubbed WannaCry slowed late on Friday, after the so-called “ransomware” locked up more than 100,000 computers, demanding owners pay to $300 to $600 get their data back.


“It’s paused but it’s going to happen again. We absolutely anticipate that this will come back,” said Patrick McBride, an executive with cyber-security firm Claroty.


Symantec predicted infections so far would cost tens of millions of dollars, mostly from cleaning corporate networks.


Ransoms paid so far amount to only tens of thousands of dollars, one analyst said, but he predicted they would rise.


Companies rushed to protect Windows systems with patches that Microsoft released last month and on Friday.


WannaCry exploited a vulnerability to spread itself across networks, a rare and powerful feature that caused infections to surge on Friday.


Code for exploiting that bug, which is known as “Eternal Blue,” was released on the Internet in March by a hacking group known as the Shadow Brokers.


1010849

A window announcing the encryption of data including a requirement to pay appears on an electronic timetable display at the railway station in Chemnitz, Germany. — AFP[/caption]

The group claimed it was stolen from a repository of National Security Agency hacking tools.


The identity of the Shadow Brokers is not known, though many security researchers say they believe they are in Russia, which is a major source of ransomware and was one of the countries hit first and hardest by WannaCry.


Cyber security experts, who have been on watch for months for an “Eternal Blue” based attack, said on Saturday that they expect the computer code to be used in types of cyber attacks beyond extortion campaigns, including efforts to seize control of networks and steal data.


Governments and private security firms on Saturday that they expect hackers to tweak the malicious code used in Friday’s attack, restoring the ability to self-replicate.


Those expectations prompted businesses to call in technicians to work over the weekend to make sure networks were protected with security updates needed to thwart Eternal Blue.


“It’s all hands on deck,” said Shane Shook, an independent security consultant whose customers include large corporations and governments.


Guillaume Poupard, head of France’s national cyber security agency, said he is concerned infections could surge again tomorrow, when workers return to the office and turn on computers.


The US government on Saturday issued a technical alert with advice on how to protect against the attacks, asking victims to report attacks to the Federal Bureau of Investigation or Department of Homeland Security.


RENAULT HALTS PRODUCTION


Security software maker Avast said it had observed 126,534 ransomware infections in 99 countries, with Russia, Ukraine and Taiwan the top targets.


Security experts said that they were not sure how many victims would pay the ransoms, or if access to computers was being restored after such payments.


Elliptic, a private security firm that investigates ransomware attacks, said that only about $32,000 had been sent to bitcoin addresses listed by the extortionists in ransom demands that flashed on screens of infected computers.


“We expect this number to increase significantly over the course of the weekend,” said Tom Robinson, lead investigator at Elliptic.


That is far below what it is likely to cost companies to recover from such attacks.


Symantec researcher Vikram Thakur said that total repair costs are likely to be in the tens of millions of dollars.


1010850

A woman points to the website of the NHS: East and North Hertfordshire notifying users of a problem in its network, in London on Saturday. — AFP[/caption]

“The expensive part is the clean up of the machine and restoring the encrypted data,” he said.


Still, such figures do not account for lost production at firms like Renault, which on Saturday said it had halted stopped manufacturing at plants in Sandouville, France and Romania to prevent the spread of ransomware in its systems.


Among the other victims is a Nissan manufacturing plant in Sunderland, northeast England, though a spokesman said “there has been no major impact on our business.”


Hundreds of hospitals and clinics in the British National Health Service were infected on Friday, forcing them to send patients to other facilities.


On Saturday, Interior Minister Amber Rudd said that 97 per cent of the nation’s health service trusts were “working as normal.”


German rail operator Deutsche Bahn said some electronic signs at stations announcing arrivals and departures were infected.


In Asia, some hospitals, schools, universities and other institutions were affected, though the full extent of the damage is not yet known due to the weekend.


International shipper FedEx Corp said some of its Windows computers were also breached. “We are implementing remediation steps as quickly as possible,” a FedEx statement said.


Telecommunications company Telefonica was among many targets in Spain. Portugal Telecom and Telefonica Argentina both said they were also targeted. — Reuters


SHARE ARTICLE
arrow up
home icon