Microsoft Ransomware Patch: Installing Updates Can Stop Cyberattack

"Microsoft worked throughout the day to ensure we understood the attack and were taking all possible actions to protect our customers".

The Redmond giant likened the WannaCry attack to the U.S. military as unsafe as getting their missiles stolen. This included the release of the patch in March and an update on Friday to Windows Defender to detect the WannaCrypt attack.

The company's top lawyer said the government should report weaknesses they discover to software companies rather than seek to exploit them.

A massive ransomware called WannaCry has hit devices across the world, in 99 countries.

Microsoft blamed the USA government for "stockpiling" software code that was used by unknown hackers to launch the attacks.

The attackers were thought to be using a tool stolen from the National Security Agency, which then took advantage of glitches in the Microsoft Windows operating system to spread malware, affecting hundreds of thousands of computers.

So far, Apple Mac computers are not being targeted by this cruel ransomware attack.

This ransomware simply locks up the files on an infected computer and encrypts them so that the owner or authorized user can no longer access them. The incident was first reported on May 12 and within a few hours, the WannaCry Ransomware had locked 75,000 cyber attacks in 75 countries demanding a random of United States dollars 300 to 600 from the users to give access to them.

Following the flurry of reports of the attack, the chief of global and legal affairs at Iran's Cyber Police warned that the "ransomware", which has affected countless computer systems worldwide, has done the same to some systems inside the country.

In a blog posted on Sunday by Brad Smith, president and chief legal officer for Microsoft, he discussed that with the growing sophistication of cyberattacks, the practice of collecting malicious tools by the government has done more harm than good.

On the 12th of May 2017, a new strain of the Ransom.CryptXXX (WannaCry) strain of ransomware began spreading, impacting a large number of organisations in Europe, demanding a ransom of $300 to $600 in Bitcoin to be paid by the 15th of May 2017.

Smith argued that in cyberspace, governments should apply rules like those regarding weapons in the physical world.

Avast said it had seen over 75,000 cases of the ransomware as of this weekend.

Bkav recommends that all computer users immediately install updates and security patches and hotfixes via Windows Update. "When something happens, the finger gets pointed at the attacker, not at Microsoft", Ad Age quoted Pike as saying.

"MeitY has initiated contact with relevant stakeholders in public and private sector to "patch" their systems as prescribed in the advisory issued by CERT-IN".



Other news