"So there's a good chance they are going to do it. maybe not this weekend, but quite likely on Monday morning". However, if you are one of those who still resubmits the chain message because otherwise something horrific could happen anytime, pay attention...
Microsoft blamed the us government for "stockpiling" software code that was used by unknown hackers to launch the attacks. No reports have come to Cert-In. It has attacked hundreds of thousands of computers, security experts say, from hospital systems in the United Kingdom and a telecom company in Spain to universities and large companies in Asia. The ransomware was created to repeatedly contact an unregistered domain in its code.
The attack locked up computers at factories, banks, government agencies and affected transport and communications systems. Copycat attacks could follow.
The U.S. government has not denied that. "It's a big priority of mine that we protect the financial infrastructure", he said.
A screenshot of the warning screen from a purported ransomware attack, as captured by a computer user in Taiwan, is seen on laptop in Beijing, Saturday, May 13, 2017.
In the meanwhile. WannaCrypt ended up locking the machines and even encrypted some of the files and they demanded as much as $600 in Bitcoin for simply a recovery key. And while Microsoft said it had already released a security update to patch the vulnerability one month earlier, the sequence of events fed speculation that the NSA hadn't told the USA tech giant about the security risk until after it had been stolen. However, the vulnerability was still present in many devices, whether it was because they disabled automatic security updates or because the devices relied on unsupported Windows products.
The tool affords hackers undetected entry into many Microsoft computer operating systems, which is what they need to plant their ransomware.
As of now the attacker and the motive behind the attack are unknown. "Remarkably few payments" had so far been made in response to this attack, he added.
Sixteen National Health Service organizations in the United Kingdom were hit, and some of those hospitals canceled outpatient appointments and told people to avoid emergency departments if possible.
Spain's Telefonica, a global broadband and telecommunications company, was among the companies hit.
So far, not many people have paid the ransom, said Jan Op Gen Oorth, a spokesman for Europol, the European police agency. However, the tech-giant criticized the government and NSA for stockpiling the security flaw information that it found rather than notifying the companies about it and said that the ongoing attack is rather a "wake-up call" for the governments.
The malware only affected Windows operating systems.
East and North Hertfordshire NHS Trust, which runs hospitals in an area north of London, said "the trust has experienced a major IT problem, believed to be caused by a cyberattack".
Officials urged organizations and companies to immediately update their security software.
In the United States, officials said they were working to identify those responsible for the attack.
According to the Ministry of Education, the malware infected 59 computers in the 10 schools.