As if dealing with the continuing drama of the WannaCry global ransomware attack was not enough, the original group behind the leak of National Security Agency (NSA) hacking tools has announced it will release more vulnerabilities that could be exploited in the near future.
"The governments of the world should treat this attack as a wake-up call", Smith said. While the leading tech firm Microsoft is holding the United States government responsible for the massive attack, some worldwide experts have counterattacked Microsoft, claiming it also be responsible for the happening.
"The government can't do this alone - they're really going to have to reach out and work with Apple, with Microsoft and Google", Martin said.
Weisman: Microsoft issued a patch for this vulnerability a few weeks ago, but many companies and institutions have not installed it yet.
Then there's the USA government, whose Windows hacking tools were leaked to the internet and got into the hands of cybercriminals. WannaCrypt hijacks this connection using EternalBlue, which allows the malware to spread across businesses in seconds.
While individuals and organizations can not anticipate and combat every ransomware or other cyber-security threat, there are steps to take that decrease the likelihood of becoming the victim of an attack.
In addition to ensuring applications and operating systems are patched with the latest security updates, CERT says organizations should "be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about employees or other internal information".
And now, the group named Shadow Brokers, that had leaked the tools from the U.S. national security agency's stockpile of cyber weapons, which were used by hackers for the recent attacks has said in a blog that it would be releasing hacking tools every month. For many victims, finding and paying in Bitcoin is a task that is beyond them. These two directives are incompatible in a global system: weaknesses exploited to attack an adversary are making the home networks equally vulnerable. Companies can also install white listing software that prevents the downloading of unauthorized computer software. Instead, it held back a free fix update on machines running older software like Windows XP. The fact that the WannaCry attack has persisted for so long indicates how many people globally refuse to update and protect their systems, despite the risks. The malicious software is gradually gaining control over other computer systems too.
The high price highlights the quandary the world's biggest software company faces as it tries to force customers to move to newer and more secure software, while at the same time earning a profit from the army of engineers it employs on security issues. This ransomware attack, which demands users shell out $300 to $600 worth of Bitcoins to regain access to their systems, spread across Asia after rocking Europe this weekend.