After the storm, security experts begin to take stock of the entire computer attack, which begins to show curious figures such as that more than 98% of the victims were using Windows 7.
While the focus so far has been mostly on computers running Windows XP, a set of newly released figures by Kaspersky Lab has revealed that nearly all WannaCry victims were, in fact, running Windows 7.
IT security service provider LGMS founder Fong Choong Fook said the public should in fact be more cautious about the prospect of a second wave of attacks, urging all who are still using obsolete Windows devices to have their systems upgraded.
The findings varied according to different methods employed by various security firms, but security ratings firm BitSight also found 67 percent of infections had hit Windows 7, according to Reuters.More news: British Police Stop Sharing Manchester Attack Information With US After Media Leaks
"They should be proactive in the way information and systems are handled as these will help in minimising risks of attacks as well as possible loss of vital information", he said.
WannaCry ransomware has been the most discussed PC virus lately.
"The exploit technique is known as HeapSpraying and is used to inject shellcode into vulnerable systems allowing for the exploitation of the system", the firm said in an advisory.
In the U.K., NHS trusts were the most-hit organizations.
By contrast, the United States accounts for just 7 per cent of WannaCry infections while Britain, France and Germany each represent just 2 per cent of worldwide attacks, Kryptos said.More news: Oil slips further following Opec meet
If you have not updated your Windows machine or are unsure of how to proceed, check out our guide on ways to protect yourself against WannaCry.
Systems affected by the ransomware that are still in the update cycle were at least two months' behind on security updates.
It has been said that those running pirated versions of Windows are most likely to have not installed the latest update having been forced to switch off automatic updates in order to prevent Microsoft being alerted that an unofficial version of Windows was being used.
It was unclear whether the disparity reflected Kaspersky security software placement - in, say, far more PCs running the 64-bit version of Windows - the prevalence of 64-bit over 32-bit at this point, or a more efficient spreading mechanism of WannaCry under a 64-bit OS.
If you are running a pirated version of the any of the above operating systems, you only have yourself to blame if your machine becomes infected with viruses or malware.More news: GOP senators say tough report complicates health care bill
- Manchester United Fans Already Wearing Griezmann Jerseys Ahead of Potential Sensational Move
- Knight Riders end defending champions Sunrisers' run in IPL
- Cavaliers cruise past Celtics into National Basketball Association finals
- Oil prices settle lower on disappointment in OPEC's production policy
- South Korea's impeached president pleads not guilty in corruption trial
- Father pens touching open letter to Ariana Grande
- Manchester terror attack probe widens as US leaks grate
- Quality, not quantity, matters as Manchester United seek to strengthen
- Turkey Demands US Oust 'Pro-Kurd' Envoy McGurk
- Gowdy Grills Ex-CIA Chief John Brennan on Russia Claims