Trusts sent fix that would have protected them — NHS Digital

Fernando Stephens
May 18, 2017

Cyber security experts in the National Health Service (NHS) worked alongside the National Cyber Security Centre (NCSC), part of the GCHQ spy agency, to patch computer systems after the attack caused widespread problems on Friday, Wallace said.

The NHS, which was showcased in the opening ceremony of the 2012 Olympic Games, employs more than 1.5 million people, making it the world's fifth biggest employer after the US and Chinese militaries, Walmart and McDonald's.

Other high-profile victims include hospitals in Britain, the Spanish telecoms giant Telefonica, French carmaker Renault, US package delivery company FedEx, Russia's interior ministry and the German rail operator Deutsche Bahn.

Dozens of public and private sector organisations in 150 countries across the world had their computers hit last week in a "ransomware" attack.

Other Windows systems had also been affected and just 4.7% of NHS systems were still running XP, he said.

Hunt said it was "encouraging" that no further attacks on the NHS had been identified.

A spokesman said: "Our understanding is that if that had been acted on it would have prevented [the malware attack]".

The effects were felt across the globe, with Russia's Interior Ministry and companies including Spain's Telefonica, FedEx the USA and French carmaker Renault all reporting disruptions.

U.S. Homeland Security Adviser Tom Bossert said the attackers collected less than $70,000.

Wana Decryptor exploits a Windows flaw that was patched in Microsoft's Security Bulletin MS17-010 in March.

Europol executive director Rob Wainwright had warned on Sunday the situation could worsen when workers return to their offices on Monday after the weekend and logged on.

"The banks' greatest fear is copycat attacks", said Keith Gross, who chairs the European Banking Federation's cybersecurity working group.

The blaming has already started.

"We have seen vulnerabilities stored by the Central Intelligence Agency show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world", wrote Smith.

When the National Security Agency lost control of the software behind the WannaCry cyberattack, it was like "the US military having some of its Tomahawk missiles stolen", Microsoft President Brad Smith says, in a message about the malicious software that has created havoc on computer networks in more than 150 countries since Friday.

After WannaCrypt, a cryptocurrency attack is generating digital cash fast
They are said to "mine" for the currency and are occasionally rewarded with a piece of it. Adylkuzz makes no announcement when it quietly invades target computers.

The NSA exploit codes were leaked earlier this year by the Shadow Brokers hacking group which had previously been offering the USA government cyber weapons in exchange for millions of dollars in Bitcoin. A worrying addition is that if one pc in a network is infected, the virus spreads to all computers on that network. "This patch came out three months ago", he adds. Have you paid the ransom?

"You can decrypt some of your files for free", reads the message, which we're seeing in a variety of languages.

"This strain of malware is one of the few that combine the aggressive spreading mechanism of a cyber-weapon, with the irreversible destructive potential of ransomware".

"It's one of those things, in a ideal world, if people were up to date on the patches, this wouldn't be a problem", O'Leary said.

State media in China reported that hundreds of thousands of devices there were infected. We assume that the problems are due to the weekend's global cyberattacks. The company said the virus has been localized and "technical work is underway to destroy it and update the antivirus protection".

European auto factories and Russian banks were also affected by the attack, which blocks computers and threatens to delete the locked files unless a ransom is paid.

"At this stage we do not have any evidence that patient data has been accessed", the system says.

There is concern that family doctors' surgeries could be struck on Monday when they open.

National Health Service: At least sixteen NHS organizations have been hit, according to NHS Digital.

The trust, which provides hospital and community-based services to 258,000 people across Southport, Formby and West Lancashire, said in a statement that dialysis and blood clinic patients should attend as per normal.

Although no hospitals in the county were affected by last Friday's attack, the decision to close the IT systems was taken as a precautionary measure.

Home Secretary Amber Rudd will chair a meeting of the Government's emergency COBRA committee later.

On Monday, the James Paget University Hospitals were working through backup plans with "most surgery and outpatient appointments" going ahead, according to a Facebook update on Monday mid-morning.

State police: Police in the southern Indian state of Andhra Pradesh said 25% of its systems were hit by the attack late Saturday. "And it would take a lot more effort to try to stop that next wave of attack". "Our cybercrime teams are now working to retrieve lost data", Joshua said.

Other reports by BadHub

Discuss This Article