Hacking Attack has Security Experts Scrambling to Contain Fallout

Hacking Attack has Security Experts Scrambling to Contain Fallout

- in Business
15
0

The coordinated attack was first reported in Britain on Friday and spread globally. It has set off fears that the effects of the continuing threat will be felt for months, if not years. It also raised questions about the intentions of the hackers: Are they acting for mere financial gain or for other unknown reasons?

“Ransomware attacks happen every day — but what makes this different is the size and boldness of the attack,” said Robert Pritchard, a cybersecurity expert at the Royal United Services Institute, a research organization in London. “Despite people’s best efforts, this vulnerability still exists, and people will look to exploit it.”

While most cyberattacks are inherently global, this one, experts say, is more virulent than most. Security firms said it had spread to all corners of the globe, with Russia hit the worst, followed by Ukraine, India and Taiwan, said Kaspersky Lab, a Russian cybersecurity firm.

The attack is believed to be the first in which such a cyberweapon developed by the N.S.A. has been used by cybercriminals against computer users around the globe.

While American companies like FedEx said they had also been hit, experts said that computer users in the United States had so far been less affected than others because a British cybersecurity researcher inadvertently stopped the ransomware from spreading.

The hackers, who have yet to be identified, included a way of disabling the malware in case they wanted to shut down the attack. They included code in the ransomware that would stop it from spreading if the virus sent an online request to a website created by the attackers.

The 22-year-old British researcher, whose Twitter handle is @MalwareTechBlog and who confirmed his involvement but insisted on anonymity because he did not want the public scrutiny, found the kill switch’s domain name — a long and complicated set of letters. Realizing that the name was not yet registered, he bought the name himself. When the site went live, the attack stopped spreading, much to the researcher’s surprise.

“The kill switch is why the U.S. hasn’t been touched so far,” said Matthieu Suiche, founder of Comae Technologies, a cybersecurity company in the United Arab Emirates. “But it’s only temporary. All the attackers would have to do is create a variant of the hack with a different domain name. I would expect them to do that.”

Across Asia, universities, companies and other organizations said they had been affected.

In Taiwan, threads soon began popping up on the popular online message board PTT with users’ tales of how their computers had been infected and tips on how to avoid the virus. Apple Daily, a local tabloid, reported suspicions that at least some of the perpetrators may be from China. The newspaper compared the attackers’ clumsy English used in infection notices with the fluent, and even slightly playful, messages that appeared on computers with Chinese-language operating systems.

In China, the virus hit the computer networks of both companies and universities, according to the state-run news media. News about the attack began trending on Chinese social media on Saturday, though most attention was focused on university networks, where there were concerns about students losing access to their academic work.

Graphic

Animated Map of How Tens of Thousands of Computers Were Infected With Ransomware

A new strain of ransomware spread rapidly around the world on Friday.



OPEN Graphic


The attack spread like wildfire in Europe, including to companies like Deutsche Bahn, the German transport giant, and Telefónica, a Spanish telecommunications firm, though no major service problems had been reported across the region’s transportation or telecommunications networks.

Nissan, the Japanese auto giant, said its manufacturing center in Sunderland in the north of England had been affected, though a spokesman declined to comment on whether the company’s production had been stopped.

In Britain, the National Health Service may be one of the largest institutions affected worldwide. It said that 45 of its hospitals, doctors’ offices and ambulance companies had been crippled. Surgical procedures were canceled and some hospital operations shut down as government officials struggled to respond to the attack.

“We are not able to tell you who is behind that attack,” Amber Rudd, Britain’s home secretary, told the BBC on Saturday. “That work is still ongoing.”

In Russia, Leonid Levin, the chairman of the parliamentary committee on information policy, said the attack showed the need for the country to add to legislation protecting “critical information infrastructure,” That body of laws has in recent years drawn criticism from rights groups for blocking the free flow of information into and out of Russia.

On Saturday, Russian news reports detailed attacks against computers used by the country’s traffic police to deliver new drivers’ licenses. The report followed confirmation that more than 1,000 computers using the Windows operating system had been affected at the country’s Interior Ministry.

The cyberattack was able to spread so quickly in part because of its high level of sophistication. The malware, experts said, was based on a method that the N.S.A. is believed to have developed as part of its arsenal of cyberweapons. Last summer, a group calling itself the “Shadow Brokers” posted online digital tools that it had stolen from the United States government’s stockpile of hacking weapons.

The connection to the N.S.A. is likely to draw further criticism from privacy advocates who have repeatedly called for a clampdown on how the agency collects information online.

Industry officials said law enforcement officials would find it difficult to catch the ringleaders, mostly because such cyberattacks are borderless crimes in which the attackers hide behind complex technologies that mask their identities. And national legal systems were not created to handle such global crimes.

Brian Lord, a former deputy director for intelligence and cyberoperations at Government Communications Headquarters, Britain’s equivalent to the N.S.A., said that any investigation, which would include the F.B.I. and the National Crime Agency of Britain, would take months to identify the attackers, if it ever does.

By focusing on large institutions with a track record of not keeping their technology systems up-to-date, global criminal organizations can cherry-pick easy targets that are highly susceptible to such hacks, Mr. Lord said. “Serious organized crime is looking to these new technologies to the maximum effect,” he said. “With cybercrime, you can operate globally without leaving where you already are.”

Of the current attack, he said: “It was well thought-out, well timed and well coordinated. But, fundamentally, there is nothing unusual about its delivery. It is still fundamentally robbery and extortion.”

Microsoft released a software update for Windows available to those affected by the attack and others that could be potential targets. Yet security experts said the software upgrade, while laudable, came too late for many of the tens of thousands of machines that were locked and whose data could be erased.

Government officials and industry experts also warned on Saturday that other hackers might now try to use the global ransomware attack for their own means, potentially tweaking the code and developing their own targets for new cyberattacks.

“As with everything in cyber, we’re now waiting for the next type of attack,” said Paul Bantick, a cyber security expert at Beazley, a global insurance underwriter, who has handled similar ransomware attacks for clients around the world.

“Ransomware like this has been on the rise over the last 18 months,” he said. “This represents the next step that people were expecting.”

Continue reading the main story

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

You may also like

Ford Reports a Small Profit, but Its New Chief Faces Slowing Sales

Ford F-150 trucks on an assembly line