NHS 'open for business' amid 'international manhunt' for cyber attackers

Amos Gonzales
May 17, 2017

"Small business owners should be pro-active about their cyber security in the wake of this ransomware campaign affecting computers around the world", Tehan said in a statement.

Brian Lord, managing director of cyber and technology at cyber security firm PGI, said victims had told him "the customer service provided by the criminals is second-to-none", with helpful advice on how to pay: "One customer said they actually forgot they were being robbed".

U.S. President Donald Trump ordered Tom Bossert, homeland security adviser, to conduct an emergency meeting and asses the threat posed by the ransomware attack.

In Russia, where a wide array of systems came under attack, officials said services had been restored or the virus contained. Security firms say Russian Federation was the country that was hit the hardest.

The attack looks like this: Images appear on victims' screens demanding payment of $300 (275 euros) in the virtual currency Bitcoin, saying: "Ooops, your files have been encrypted!"

The malware - called WannaCry - uses a type of action known as EternalBlue, believed to have been developed by the American National Security Agency. "Attackers update their software. other attackers will learn from the method and will carry out attacks".

Copycat variants of the malware could also contribute another wave of attacks this week after a 22-year-old British researcher that goes by the name "MalwareTech" stumbled on a "kill switch" that slowed the spread of the initial virus.

Even though the virus's spread slowed over the weekend, European authorities warned of more attacks on the horizon.

WannaCry exploits a Windows vulnerability patched in March by Microsoft. "They can do so much damage", he says.

Most UK patients saw no change on Monday after cyber attack -minister
Microsoft has rolled out a free security update to Windows XP, Windows 8, and Windows Server 2003 "to protect their customers". Victims who opened the attachment in the email were served with the ransomware , which takes over the computer.

BLOOD tests will resume at hospitals across mid Essex following the NHS cyber attack last week.

Around a fifth of NHS trusts were hit in the attack, forcing them to postpone operations and procedures over the weekend.

Infected computers appear to be largely out-of-date devices.

A spokesperson said: "In addition to providing 24/7 specialist support, we have issued a number of targeted bulletins to further support, guide and reassure NHS staff with cyber-security responsibilities in their organisations. It was clear warnings were given to hospital trusts but this is not something that focused on attacking the NHS here on the United Kingdom".

As people across the globe returned to work, Japan reported 2,000 computers at 600 locations had been affected, with firms including Hitachi and Nissan reporting problems.

"These alerts included a patch to protect their systems".

He said: "They do it for altruism and for the kudos of working with us".

The Prime Minister's spokesman said today that less than five per cent of NHS systems are still running Windows XP and that other Windows operating systems were also affected.

Officials struggled to explain why some NHS computers had not been "patched" with Microsoft updates to close the vulnerability that allowed the worm to spread across its networks.

Other reports by BadHub

Discuss This Article

FOLLOW OUR NEWSPAPER