Ransomware WannaCry to attack Indian banking system soon: Cyber expert

  • Ransomware WannaCry to attack Indian banking system soon: Cyber expert

Ransomware WannaCry to attack Indian banking system soon: Cyber expert

Those include a known and highly unsafe security hole in Microsoft Windows, tardy users who didn't apply Microsoft's March software fix, and malware created to spread quickly once inside university, business and government networks. But in this case, according to Kaspersky Lab, the shared code was removed from the versions of WannaCry that are now circulating, which reduces the likelihood of such a "false flag" attempt at misdirection. Updating software will take care of some vulnerability.

"We know the attackers will update their code with a workaround, so we can anticipate more", Milford said. The malware has been identified using 27 different languages. Moreover, the discovery of a "kill switch" that could deactivate WannaCry may have given American businesses a reprieve from the worst effects of the software. This ransomware takes advantage of a security hole in Windows server software that can be closed by an update from Microsoft. Install Microsoft's patch. 3.

"After the virus breakout, the authorities immediately made arrangements for cyber security guards and domestic cyber security companies to proactively provide security services and preventive tools", the official said.

In a separate malware attack previous year, 3.2 lakh debit cards were compromised in the country.

The attack followed the leak earlier this year of a batch of cyber weapons built by the United States National Security Agency (NSA). India needs to look at some more holistic perspective with how to deal with cyber security.

But security experts challenged that argument, saying that Microsoft could not be expected to keep updating old software products indefinitely. "However, it is usually open on intranets used in many industries and enterprises because they think their intranets can be isolated with the extranet".

"We believe [WannaCry's operators] are amateurs", said Catalin Cosoi, chief security strategist at the cyber security firm Bitdefender.

He also compared both WikiLeaks' release of CIA hacking tools in March and the stealing of a Microsoft Windows vulnerability from the National Security Agency last month to the theft of weapons from the USA military.

"While this protected newer Windows systems and computers that had enabled Windows Update to apply this latest update, many computers remained unpatched globally", he said.

"Probably like many organizations this morning, we're cautiously optimistic that things will be OK", Parker said.

The initial attack on Friday - called "WannaCry" - first infected computers that run the UK's hospital network, Germany's national railway and several other companies and government agencies worldwide in what is being called the "the biggest ransomware attack ever".

Maharashtra Anti-Terrorism Squad (ATS) on Wednesday denied any hacking or ransomware virus attack to its website. The illegal software can not be easily updated.

"It's likely because our systems are more sophisticated in protecting against cyberattack", said Michael Figueroa, executive director of the Advanced Cyber Security Center, a Boston-based consortium of local universities and corporations that share information about the latest digital security threats.

However, a cyber security expert working with the Centre for Internet and Society, Udbhav Tiwari working on vulnerabilities such as these, said as most ATMs in the country especially of the public-sector banks run on outdated operating systems, or are not updated regularly, they can be easily compromised. "Otherwise they're literally fighting the problems of the present with tools from the past".