Ransomware is a term that we will be hearing more about, and 2017 will go down as the year with the highest number of attacks. It took advantage of a vulnerability in Windows that allowed it to infect PCs.
Currently, an estimated 200,000 victims in 150 different countries are reported to have been hit by the cyberattack.
The cyber-attack has disrupted NHS services in parts of England and Scotland since Friday afternoon.More news: Korean diplomat to meet ex-US officials in Europe
WannaCry ransomware had spread using a loophole in Microsoft windows operating systems that were initially found by the USA national security agency (NSA), which according to reports was using it in order to find a way to hack networks of terrorist groups, and was leaked by Shadow Brokers, which said that it had found the tools in agency's servers which the group had breached earlier.
The "ransomware" cyberattack on companies and governments around the world has yet to victimize anyone at the University of IL, mostly because the UI bans outdated versions of the Windows operating system targeted by the virus.
Looking at the attackers' Bitcoin wallets they've made $42,000 so far. But experts say that hackers behind WannaCry are overloaded with decryption requests - in fact, many users who have paid the ransom are still waiting for their computer access to be restored.More news: IEA sees oil market rebalance but warns of Libya, Nigeria surge
Malware cases have been spreading in recent years as the malicious software trend has been gaining ground, with new forms of ransomware hitting the scene. He admits to have accidentally stopped the infection by registering a domain name (9iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com) that he found in WannaCry's code, without knowing what its effect would be.
However, Bossert warned that following the patching advice from Microsoft and the Federal Bureau of Investigation should be a top priority to stop the spread of ransomware, which has hit a number of large-profile companies, including FedEx.
The worst is not quite over, the virus is set to return in a variant. "We are in the second wave", said Matthieu Suiche of Comae Technologies. The first thing to do to protect yourself against this vicious type of ransomware is to install the security patches Microsoft issued to handle the vulnerability. Most importantly, take back-ups. Over the weekend, Microsoft rolled out a patch for Windows XP, Windows Server 2003 and Windows 8.More news: UK's Liberal Democrats promise new Brexit vote if elected
- Snapchat growth stalls in first earnings report
- Aishwarya Rai Bachchan Leaves For Cannes 2017 With Daughter Aaradhya
- U.S. considers laptop ban on European flights
- 'Didn't care', 'I'm happy' - Liverpool fans react to Arsenal win against Sunderland
- Featured Stock Overview: Ford Motor Co
- 2 dead after tornadoes hit Oklahoma, Wisconsin
- Jimmy Fallon says he was "devastated" by reaction to Trump interview
- Watch Melissa McCarthy Take Her Spicer Impression to the Streets on 'SNL'
- Global cyber attack slowing down but fears remain
- Fernando Alonso expected to slump even without clash