The series of ransomware virus WannaCry attacks targeting more than 300,000 computers in more than 150 countries continued on Monday, and, there have been reports of ransom virus attacks from India, China and Japan.
The ransom virus – WannaCry, which has more than two lakh computers in more than 150 countries, was also targeted by the computer of two Gram Panchayat offices in Durkarel, for this ransom virus, and to recover the savings files on them, the amount of $ 300 Appearance message.
A cybersecurity company, Rapid7 said that in its research it had found more than 100,000 computers running vulnerable versions of free File folder networking sharing software, Samba, developed for Linux and Unix computers to work with windows computers are also vulnerable to Wannacry.
Meanwhile, Information Technology Minister Ravi Shankar Prasad said in the India TV’s Dialogue program that the impact of ‘ransomware’’ attack in India is not equal to that and India is increasing cyber security.
Newly Discovered Vulnerability Raises Fear of More Cyber-Attacks
Computers of two Gram Panchayat offices in Kerala became the target of this ransom virus. They received a message asking them to reciprocate the amount of $ 300 as a ransom. Officials at the Thariod Panchayat office in the hill town of Wayanad district, who started the computer, told that four computers of the office have targeted for this virus. Similarly, in the Pathanmthita district, on the computer of the Arvapulam Gram Panchayat office near Konni, they got similar messages. Information technology experts are working to fix these computers.
600 Japanese companies have also been victims of this ransomware attack, including electronics giant Hitachi and leading vehicle manufacturer Nissan. On Monday, the authorities confirmed the ransomware i.e. ‘ransom virus’ cyber attack.
According to the news agency Xinhua, in China, 29,000 computers of computers were victims of this ransom virus. While in other reports, millions of computer users of China’s more than 30,000 institutions have been victims of cyberattacks. Apart from this, documents from some schools in China have destroyed.
Australian Cyber Security Minister has said that at least one company affected in Australia by Wannacry Ransomware. It has succeeded in hacking computers in the earlier versions of Microsoft’s operating system windows due to a weakness.
Read Also: Ransomware ‘WannaCry’ Hits India Also
The hackers have sought ransom money in the form of a digital currency to recover the files that saved from the cyber attack by the hackers.
A message asking for an amount of $ 300 through digital currency ‘bitcoin’ is showing to recover the savings files on computers. Europeol is analyzing this ransom virus. Although the group of hackers who have been taking targets for the entire world has not been able to know so far. Microsoft’s president and chief legal officer Brad Smith issued a statement on Sunday. They criticised the governments hiding information about security flaws in computer systems. According to this statement, people are returning to work on Monday after the cyber attack on Friday. Thereby there is a possibility of a ‘RanSware’ cyber attack in the future.
The danger of WannaCry ransomware is not that there is a similar malware that has come up. Its name is called EternalRocks. The special thing is that this randmware also has been developed by the American National Security Agency.
EternalRocks is also dangerous. Because the Researchers believe that it uses the seven hacking tools of the NSA to spread from one computer to another. These include EternalBlue, EternalChampion, Eternalsynergy, Doublepulsar, Architouch and SMBTouch.
It is worth noting that in April, the hacking tool of the NSA was allegedly leaked by the hacker group named Shadow Breaker. After this, the group also threatened that the data will dumped over the next few months.
How Malware Works:
The way this randmware works is a little different. Because it infects the system in the first stage and downloads the tor network. The second stage of the attack starts after 24 hours when the command and the control server responds. Late attack is a trick, so it is difficult for the system to detect it.