Cyber warning to South Africans after global attack

Cyber warning to South Africans after global attack

Cyber warning to South Africans after global attack

Indian government's cyber security wing - Indian Computer Emergency Response Team (CERT-In) has cautioned the country's key stakeholders like RBI, National Payments Corporation of India, National Informatics Center (NIC) and other organizations of the malware and advised them to protect their systems against the ransomware.

"We're in the face of an escalating threat".

"Right now, just about every IT department has been working all weekend rolling this out", Dan Wire, spokesman at Fireeye Security, said.

Scotland's Health Secretary, Shona Robison, said NHS computer systems are returning to normal after the cyber attack.

It was too early to say who was behind the onslaught, which struck 100,000 organizations, and what their motivation was, aside from the obvious demand for money.

However, Wainwright said Europol was working on the basis that the cyber-attack was carried out by criminals rather than terrorists, but noted that "remarkably few" payments had been made so far.

U.S. package delivery giant FedEx, European vehicle factories, Spanish telecoms giant Telefonica, Britain's health service and Germany's Deutsche Bahn rail network were among those hit.

VW CEO investigated for market manipulation
A similar inquiry was launched previous year into current and former VW board members over the same accusations. Two Porsche bosses are now being probed due to their role in Volkswagen's emissions scandal.

In total, over 150 countries have been affected by the ransomware since Friday, according to Europol.

Cheryl McNulty and Scott Wright welcomed their daughters into the world on Saturday morning as NHS Lanarkshire was battling to contain the damage to its IT system caused by hackers. China's securities regulator also said that it had taken down its network and was installing a patch as a security measure.

The "Eternal Blue" tool developed by the National Security Agency had been dumped onto the public internet by a hacking group known as the "Shadow Brokers".

British media is hailing a 22-year-old computer security whiz who appeared to have helped stop the attack from spreading by discovering a "kill switch" - an internet address which halted the virus when activated. We have seen vulnerabilities stored by the Central Intelligence Agency show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world. While a United Kingdom security researcher managed to stop the spread of the virus, hackers have issued new versions that cybersecurity organizations are trying to counter and stamp out. The cyber-attack, he insisted, was not because of "NHS manager incompetence". The server operates as a "sinkhole" to collect information about malware - and in Friday's case kept the malware from escaping. Security sleuths are still studying the ransomware for ways to salvage already infected computers. "There were the same attacks applied to Nissan on Friday and in other areas of the economy and indeed around the world", Fallon said.

Russian President Vladimir Putin, noting the technology's link to the USA spy service, said it should be "discussed immediately on a serious political level".

Speaking on BBC Radio Scotland, Dr Andrew Cowie from Hawkhill Medical Centre in Dundee, said: "They haven't got everything up and running yet, so it's going to be a bit of a hard day".

Related news