Usually used by cyber criminals, ransomware is a popular means of making illicit money from victims who have to pay the criminals in order to have their data decrypted. We are talking about none other than the WannyCry, or WannaCrypt/Wanna Decryptor. Adylkuzz, however, is WannaCry's much quieter, much more risky cousin that could have more serious consequences for the world. Despite analysts and several companies calling out on India being badly affected by WAnnaCry, Computer Emergency Response Team (CERT) maintains that the country is not as affected as Europe and Russian Federation. There haven't been any specific instances of loss of life caused by the attack, but it isn't much of a stretch to imagine people dying due lack of health-care information.
Now, don't panic just yet.
We need to assign liabilities to companies that write insecure software that harms people, and possibly even issue and enforce regulations that require companies to maintain software systems throughout their life cycle. Businesses in China had systems hijacked, Russia's interior ministry had 1,000 computers affected and at least one South Korean movie theater had issues playing trailers.
As the effects of the WannaCry global ransomware attack continue to be felt, there is evidence emerging that the hackers are not decrypting the files of victims who decide to pay the United States $300 ransom.
WannaCry developers have prepared a Q&A section in various languages, offering infected users localised instructions on how to recover data and how to pay the ransom.
But, if everything is backed up, the encrypted files are not as valuable to the attackers.
Sen further added that people need to be careful about emails with unnecessary attachments or links that seem suspicious to avoid being hit by the ransomware threat. Eternal Blue was technically created to spy on key target points that the NSA deems necessary to. The tools were made public by a hacking group called the Shadow Brokers. The hacker group then proceeded to leak the exploits into the internet, with April 2017 as the month that the group dumped the largest amount, about 1 GB worth of weaponized exploits.
"For Microsoft to say that governments should stop developing exploits to Microsoft products is naive", said Brian Lord, a managing director at PGI Cyber and former deputy director at the Government Communications Headquarters, one of the U.K.'s intelligence agencies.
WannaCry is not the first ransomware to offer "help" to its victims.
Prabir Sarkar, CEO of OfficeExtract, a local distributor of Kaspersky Lab, said, "We have so far received complaints from five types of medium enterprises in the country".
At this point, there is no saving your files.
By 20:00 on 13 of May, hundreds of thousands computers from 29,372 institutions have been attacked by the ransomware.
For example, HR and finance departments would be the areas seeing the most incoming email traffic from unknown or relatively unknown sources. Stay away from file extensions like "exe", '.vbs" and "scr'.
Eset Ireland provided several tactics, advising users to update Windows software first, this being the single biggest commonality among those hit by WannaCry. All machine running the version of Windows operating system before windows 10 without MS17 -010 security patch are prone to this ransomware attack.
Keep your data backup regularly and store in the cloud environment.