The malware, using a technique purportedly stolen from the US National Security Agency, stopped care Friday at hospitals across the United Kingdom, affected Russia's Ministry of Interior and infected company computer systems in countries from Eastern Europe to the US and Asia.
However, this morning the trust confirmed it had not suffered from the attack, which also targeted the Russian Interior Ministry and Spanish telecoms giant, Telefonica, amongst other global organisations. Past year a number of USA hospitals had to allegedly pay ransom to get rid of such attacks, though the matter was kept under wraps as the hospitals did not want bad name.
The cyber-attack, he insisted, was not because of "NHS manager incompetence".
The virus demanded that those users pay a ransom of $300 in Bitcoin to regain control of their systems and data.
Chief executive of Wrightington, Wigan and Leigh NHS Trust, Andrew Foster, said nearly all local systems are working normally.
Cyber-security firm Avast said it has detected 75,000 cases of "Ransomware" attack in 99 different countries.
"As cybercriminals become more sophisticated, there is simply no way for customers to protect themselves against threats unless they update their systems", BBC quoted Smith as saying.
Oliver Gower of the UK's National Crime Agency said, "cyber criminals may believe they are anonymous, but we will use all the tools at our disposal to bring them to justice".
Mr Savvides says the single best way to beat "ransomware" attacks is to back up your files.
The healthcare system in the United Kingdom is reeling from a ransomware attack.
You could try downloading a copy of the Microsoft Safety Scanner on a clean, non-infected PC and copy the downloaded file to a blank USB drive or CD and then insert it into the infected PC. "It was clear warnings were given to hospital trusts but this is not something that focused on attacking the NHS here on the United Kingdom".
They proposed a plan to improve security that included a replacement of outdated systems "as a matter of urgency", calling the continued use "one of the most pressing issues facing IT infrastructure" in the NHS.
Symantec also recommends taking great care when opening unexpected emails, especially emails with a suspicious Microsoft Office attachment.