Microsoft was hoarding patches for WannaCry exploit

Cry if you WannaCry, but don't blame Microsoft for it

Cyber bad guys have spread ransomware, known as WannaCry, to computers around the world.

Most automated teller machines (ATMs) were running fine, there could be some which may not have updated Microsoft's Windows operating system, sources said.

Indian ATMs still majorly use the old and most feared to be easily hacked Windows XP operating system. "We believe the recent ransomware attack could accelerate the Windows upgrade cycle for enterprises".

The attacks have now raised questions about the use of old software by organisations, and why United Kingdom health services were using old versions of Windows without support agreements.

And now, the group named Shadow Brokers, that had leaked the tools from the USA national security agency's stockpile of cyber weapons, which were used by hackers for the recent attacks has said in a blog that it would be releasing hacking tools every month. "That people are attempting to lay blame on the company says volumes about them, and about the curious view that some have of software vendors in general and Microsoft in particular". It encrypts data on infected computers and demands payment before the information is unencrypted.

According to global cyber security firms, paying heed to updates can only save your data from being put to ransom.

Install Microsoft's official patch. Ensure that security solutions are switched on all nodes of the network. As we detailed thoroughly on Monday, WannaCry is a unsafe trojan virus that infects Windows computers, encrypting almost all data in the process.

"It's a laudable goal", he said of the Microsoft call, "But we all know some countries would sign-up and then secretly violate it".

"I was actually panicking because because one of my analysts made a mistake and they had said by registering the url we had started the infection", the unnamed researcher told ABC News. The sum itself might also give them pause.

However, Microsoft President Brad Smith said in a blog post Sunday that the "stockpiling of vulnerabilities by governments" is a huge issue.

Remove plugins and add-ons to browsers that are not certified to be virus free, and keep other plug-ins up to date, such as Adobe Flash Player, Adobe Reader, Java, etc.

"Upon learning of these incidents, McAfee quickly began working to analyse samples of the ransomware and develop mitigation guidance and detection updates for its customers".

Stronger incentives are needed to prompt users to replace rather than patch out-of-date pieces of code like Windows XP.

"Disable SMBv1 (a server component) with the steps documented at "Microsoft Knowledge Base Article 2696547" and as recommended previously".

"This is big and set to get bigger. As a result, hospitals, businesses, governments, and computers at homes were affected".

Make sure you regularly back up your computer.

"We have to do a better job of that in terms of reporting, but also in terms of experts in the security field making sure people do understand the role that they play and how to go about making themselves and society less vulnerable", Burley added.

Remember this: "WannaCrypt" probably won't work across the internet for PCs behind a firewall or router. It takes just one click on an infected link or email attachment to have the virus spread to other computers within the network.

Related:

Comments


Other news