US security agency should take some blame for ransomware attack: Chinese media

US security agency should take some blame for ransomware attack: Chinese media

Healthcare organizations still carry risk because many still operate devices that use older, unsupported versions of Microsoft operating systems.

Wouldn't it be nice if everyone was so ethical when it comes to security flaws and hacking? "You've got to keep your systems updated". The precedent may affect other software sellers too.

Once your files are encrypted, your options are limited.

That's what led to such strong warnings being issued by security experts: Chris Camacho of New York's Flashpoint said, "When people ask what keeps you up at night, it's this"; Rohy Belani of email security company PhishMe said, "This is nearly like the atom bomb of ransomware". Multiple backups also help. With this attack, Abrams recommends trying to recover the "shadow volume" copies some versions of Windows have. If you can't find it there then you need to switch to a better antivirus software, we recommend two free options - Cybereason Ransomfree and Malwarebytes Anti-Ransomware.

Make sure you regularly back up your data.

The latest ransomware was successful because of a confluence of factors.

Avivah Litan, a cybersecurity analyst at Gartner, agreed that the government is "is negligent not doing a better job protecting companies", but added that it's not like "you can stop the USA government from developing cybertools" that then work as intended. "I hope that if another attack occurs, the damage will be a lot less".

Microsoft should know that there are people, small businesses, schools and hospitals that still use older version of Windows, such as XP (which came out in 2001). Yet in an unusual step, they released a patch for those older systems because of the magnitude of the outbreak.

Wellsmore and other cybersecurity experts said the identity of the perpetrators is still unknown. "But updating your Microsoft operating system is something that should be done relatively quickly", he concludes. Low-end criminals take advantage of less-savvy users with such known viruses, even though malware is constantly changing and antivirus is frequently days behind detecting it.

Avoid downloading attachments or clicking on links found in emails from people, companies, or email addresses that you don't recognize. System administrators should ensure that employees don't have unnecessary access to parts of the network that aren't critical to their work.

However, Tom Bossert, President Trump's Homeland Security Advisor, told members of the media that the infection rates have "slowed over the weekend" since WannaCry started in the United Kingdom on Friday and quickly spread to the rest of the globe. This makes any organization (like schools, companies, hospitals, and businesses) using networked computers particularly vulnerable. Shutting down a network can prevent the continued encryption - and possible loss - of more files.

Ransomware is a kind of malicious software that, as its name implies, takes a computer hostage and holds it for ransom. There's also no guarantee all files will be restored.

"It's no longer a cost of doing business", said R. David Edelman, who advised President Barack Obama on technology.

Researchers are keen to point out that more investigation is needed before any definitive conclusions can be drawn.

"If there is a silver lining to it, you're not out a million dollars", he said.

"The problem with suggesting policy is the answer to problems like this is it suggests that there's an easy answer", Ellis said.

Lastly there are, of course, the attackers, who kidnapped precious data and demanded ransom be paid.