In this post, we'll tell you what WannaCry is, what developments we've seen over the past three days, and how to protect yourself.
He said people still using older systems should upgrade.
"The odds of getting back their files decrypted is very small", said Vikram Thakur, technical director at security firm Symantec. A Bank of Baroda official, however, said the machines were less susceptible as they work on a closed network.
Sean Pike, program VP in the security products group at IDC, a tech industry research provider, pointed that everyone has been a bit numb to attacks because it is something they hear so much about now and Microsoft benefits from that.
While speaking to media, Subhamangala, Cyber Security expert said that so far there are so many states which has been affected with this malware.
How can I personally protect my device from ransomware?
As long as your operating system is up-to-date, you should be protected from this strain of ransomware.
This virus does not rely on user interaction to spread, in other words users do not have to open a suspicious email or download unknown files.
Criminals will often use a widely publicised virus outbreak to send scam emails, pretending to offer help.
Mac or Linux users are at the moment safe from harm, but there remains a risk they could be infected via the intranet once a member computer is infected. Free software can end up costing you a lot.
"We have been strengthening our cyber security and I can proudly say that the recent cyber-attack had almost zero per cent impact in India", he said. "This ransomworm specifically used Microsoft SMB vulnerability MS17-010 to spread internally", which is the same vulnerability the NSA utilized for a couple years and was recently exposed via the January NSA tools leak.
Under former President Barack Obama, the United States government created an inter-agency review, known as the Vulnerability Equities Process, to determine whether flaws should be shared or kept secret. With this attack, Abrams recommends trying to recover the "shadow volume" copies some versions of Windows have.
Just one person in an organization who clicked on an infected attachment or bad link, would lead to all computers in a network becoming infected, said Vikram Thakur, technical director of Symantec Security Response.
"Practice ABC - assume nothing, believe no-one, check everything", says Prof Woodward. He noted there was no indication the cyber attack had resulted in widespread disclosure of personal data.
Yes, every operating system could theoretically be attacked. Of course, around the world, many more similar organizations may remain juicy targets for the increasing organized and sophisticated attackers.