WannaCry ransomware: Cash crunch hits ATMs in Bengaluru

According to the company, "customers who are running supported versions of the operating system (Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8.1, Windows Server 2012, Windows 10, Windows Server 2012 R2, Windows Server 2016) will have received the security update MS17-010 in March".

The phenomenon of companies failing to update their systems has been a persistent security problem for years.

Ransomware attacks are some of the most immediately damaging forms of cyber-attacks that affect home users, enterprises and governments equally.

Financial Tribune reported two days ago some 200 computers in the country were infected by the so-called "ransomware" software.

While businesses that failed to update Microsoft's Windows-based computer systems could be sued over lax cyber security, Microsoft itself enjoys strong immunity from lawsuits. "Some of the old ATMs were shut for software updates".

The US National Security Agency (NSA) should shoulder some blame for the attack, which targets vulnerabilities in Microsoft Corp systems and has infected some 30,000 Chinese organisations as of Saturday, the China Daily said. However, not everyone has installed the patch yet, and those who have not are vulnerable to WannaCry.

While the social media platforms were filled with posts about the ATMs not working, the corporate offices appealed to their employees to take a back-up of their data and not open any unknown attachment.

While banks and critical organisations have tightened their security systems following the global WannaCrypt ransomeware assault of the weekend, there is a blame game brewing in the United States of America over who was responsible. So, when the architect sends out a notice of a security weakness and how to fix it in versions 2 and 3, bad people can take that fix and figure out how it might apply to a version 1 castle, and the security fix becomes an attack blueprint for version 1 castles. The ease of stopping the attack suggests the hackers were new to this game.

Computers and networks that hadn't recently updated their systems are still at risk because the ransomware is lurking.

"They're going to turn on their computers in the morning and find out if they were protected or not" said James Barnett, a security expert at Venable.

While Microsoft offered deals for government agencies during the first year after the support for Windows XP was over, it charged the customers, including Britain's National Health Service (NHS), for the custom support. But it is important to understand that the way these attacks work means that compromises of machines and networks that have already occurred may not yet have been detected, and that existing infections from the malware can spread within networks.

Related:

Comments


Other news