Global cyberattack: A super-simple explanation of what happened

Share

About 97 percent of United Kingdom facilities and doctors disabled by the attack were back to normal operation, Home Secretary Amber Rudd said Saturday after a government meeting. The exploit was leaked last month as part of a trove of US spy tools.

"The odds of getting back their files decrypted is very small", said Vikram Thakur, technical director at security firm Symantec.

An unprecedented "ransomware" cyberattack that has already hit tens of thousands of victims in 150 countries could wreak greater havoc as more malicious variations appear and people return to their desks Monday and power up computers at the start of the workweek.

Wainwright said the agency is analyzing the virus and has yet to identify who is responsible for the attack. This was not a zero-day attack (meaning an attack that has never been seen before and therefore could not be caught by standard security measures) ... this was a vulnerability that has been known and has been patched by Microsoft for some time.

French carmaker Renault said its plant in the northern town of Douai would not reopen on Monday as it dealt with the cyber-attack.

Gas stations: State-run media in China reported that some gas stations saw their digital payment systems shut down, forcing customers to bring cash.

"Obviously, they want those tools in order to spy on people of interest, on other countries, to conduct surveillance", Cluley said. It said it believed the difficulties are linked to the global cyberattack but they haven't so far harmed its business operations. "Report such instances of fraud to CERT-In and law enforcement agencies", the cybersecurity authority stated. "But remember that a breach anywhere in the system - like an outdated ATM OS - can lead to breaches in the servers, bank systems and compromise of customer data", said an executive with ATM maker NCR.

The exploit, known as "EternalBlue" or "MS17-010", took advantage of a vulnerability in the Microsoft software that reportedly had been discovered and developed by the U.S. National Security Agency, which used it for surveillance activities.

The ransomware covers almost any important file type a user might have on his or her computer. Antivirus alone simply won't work.

Megafon: A spokesperson for Russian telecommunications company Megafon told CNN that the cyberattack affected call centers but not the company's networks.

The Department of Homeland Security began an "aggressive awareness campaign" to alert industry partners to the importance of installing the Microsoft patch shortly after it was released in March, an agency official working on the attack said. He said the situation was under control.

In Britain, whose health service was among the first high-profile targets of the attack on Friday, some hospitals and doctors' offices were still struggling to recover. "At this stage, we do not have any evidence that patient data has been accessed".

It was too early to say who was behind the onslaught, which struck 100,000 organizations, and what their motivation was, aside from the obvious demand for money. The state's Deputy Superintendent of Police, Palle Joshua, told CNNMoney that the impact would have been greater, but many districts took their systems offline as soon as the first attacks hit.

The Reserve Bank of India (RBI) has asked all banks to put in place a software update at automated teller machines (ATMs) to prevent their systems from a malware that has attacked payment systems across the world. "Our cybercrime teams are now working to retrieve lost data", Joshua said.

Share