Dear teachers,

Please keep updating the security updates on your computer. See article
below.
On Ubuntu, upgrade to the latest version can also be done freely without
any license fees .... Pls do
(see http://karnatakaeducation.org.in/KOER/en/index.php/Kalpavriksha for
information)

regards,
Guru

source -
http://money.cnn.com/2017/05/12/technology/ransomware-attack-nsa-microsoft/

Massive ransomware attack hits 99 countries - May. 12, 2017
------------------------------
Hospitals, major companies and government offices have been hit by a
massive wave of cyberattacks across the globe that seize control of
computers until the victims pay a ransom.

Cybersecurity firm Avast said it tracked
<https://slack-redir.net/link?url=https%3A%2F%2Fblog.avast.com%2Fransomware-that-infected-telefonica-and-nhs-hospitals-is-spreading-aggressively-with-over-50000-attacks-so-far-today>
more than 75,000 ransomware attacks in 99 countries on Friday.

It said the majority of the attacks targeted Russia, Ukraine and Taiwan.
But hospitals in the U.K., and global firms like Fedex (FDX
<http://money.cnn.com/quote/quote.html?symb=FDX&source=story_quote_link>)
also reported they had come under assault.

*What is it?*

*The ransomware locks down all the files on an infected computer and asks
the computer's administrator to pay in order to regain control of them. *

*The ransomware, called "WannaCry," is spread by taking advantage of a
Windows vulnerability* that Microsoft (MSFT
<http://money.cnn.com/quote/quote.html?symb=MSFT&source=story_quote_link>,
Tech30 <http://money.cnn.com/technology/tech30/index.html?iid=EL>) released
a security patch
<http://money.cnn.com/2017/04/15/technology/microsoft-patch-shadow-brokers/index.html?iid=EL>
for in March. But computers and networks that haven't updated their systems
are at risk. The exploit was leaked last month as part of a trove of NSA
spy tools
<http://money.cnn.com/2017/04/14/technology/windows-exploits-shadow-brokers/index.html?iid=EL>.


"Affected machines have six hours to pay up and every few hours the ransom
goes up," said Kurt Baumgartner, the principal security researcher at
security firm Kaspersky Lab. "Most folks that have paid up appear to have
paid the initial $300 in the first few hours."

Related: Microsoft quickly fixes 'crazy bad' Windows bug
<http://money.cnn.com/2017/05/09/technology/microsoft-bug-remote-windows-patch/index.html?iid=EL>

Sixteen National Health Service (NHS) organizations in the UK have been hit
<http://www.cnn.com/2017/05/12/health/uk-nhs-cyber-attack/index.html?iid=EL>,
and some of thosehospitals have canceled outpatient appointments and told
people to avoid emergency departments if possible. Spanish telecom company
Telefónica (TEF
<http://money.cnn.com/quote/quote.html?symb=TEF&source=story_quote_link>)
was also hit with the ransomware.

Spanish authorities confirmed
<https://www.ccn-cert.cni.es/seguridad-al-dia/comunicados-ccn-cert/4464-ataque-masivo-de-ransomware-que-afecta-a-un-elevado-numero-de-organizaciones-espanolas.html>
the ransomware is spreading through the vulnerability, called
"EternalBlue," and advised people to patch.

"It is going to spread far and wide within the internal systems of
organizations -- this is turning into the biggest cybersecurity incident
I've ever seen," UK-based security architect Kevin Beaumont said.

Fedex said it was "experiencing interference with some of our Windows-based
systems caused by malware" and was trying to fix the problems as quickly as
possible.

Russia's Interior Ministry released a statement acknowledging a ransomware
attack on its computers, adding that less than 1% of computers were
affected, and that the virus is now "localized." The statement said
antivirus systems are working to destroy it.

Related: NSA's powerful Windows hacking tools leaked online
<http://money.cnn.com/2017/04/14/technology/windows-exploits-shadow-brokers/index.html?iid=EL>

Megafon, a Russian telecommunications company, was also hit by the attack.
Spokesman Petr Lidov told CNN that it affected call centers but not the
company's networks. He said the situation is now under control.

The U.S. Department of Homeland Security, in a statement
<https://www.dhs.gov/news/2017/05/12/dhs-statement-ongoing-ransomware-attacks>
late Friday, encouraged people to update their operating systems. "We are
actively sharing information related to this event and stand ready to lend
technical support and assistance as needed to our partners, both in the
United States and internationally," the department said.

Kaspersky Lab says although the WannaCry ransomware can infect computers
even without the vulnerability, EternalBlue is "the most significant
factor" in the global outbreak.

*How to prevent it*

Beaumont examined a sample of the ransomware used to target NHS and
confirmed it was the same used to target Telefónica. He said companies can
apply the patch released in March to all systems to prevent WannaCry
infections. Although it won't do any good for machines that have already
been hit.

He said it's likely the ransomware will spread to U.S. firms too. The
ransomware is automatically scanning for computers it can infect whenever
it loads itself onto a new machine. It can infect other computers on the
same wireless network.

"It has a 'hunter' module, which seeks out PCs on internal networks,"
Beaumont said. "So, for example, if your laptop is infected and you went to
a coffee shop, it would spread to PCs at the coffee shop. From there, to
other companies."

Related: How leaked NSA spy tools created a hacking free-for-all
<http://money.cnn.com/2017/04/25/technology/nsa-doublepulsar-hacking-tool/?iid=EL>

According to Matthew Hickey, founder of the security firm Hacker House,
Friday's attack is not surprising, and it shows many organizations do not
apply updates in a timely fashion. When CNNTech first reported
<http://money.cnn.com/2017/04/14/technology/windows-exploits-shadow-brokers/index.html?iid=EL>
the Microsoft vulnerabilities leaked in April, Hickey said they were the
"most damaging" he'd seen in several years, and warned that businesses
would be most at risk.

Consumers who have up-to-date software are protected from this ransomware.
Here's how to turn automatic updates
<https://support.microsoft.com/en-us/help/306525/how-to-configure-and-use-automatic-updates-in-windows>
on.

It's not the first time hackers have used the leaked NSA tools to infect
computers. Soon after the leak, hackers infected thousands of vulnerable
machines with a backdoor
<http://money.cnn.com/2017/04/25/technology/nsa-doublepulsar-hacking-tool/index.html?iid=EL>
called DOUBLEPULSAR.

*-- Jethro Mullen, Clare Sebastian and Livvy Doherty contributed to this
report.*

Guru
IT for Change, Bengaluru
www.ITforChange.net

-- 
-----------
1.ವಿಷಯ ಶಿಕ್ಷಕರ ವೇದಿಕೆಗೆ  ಶಿಕ್ಷಕರನ್ನು ಸೇರಿಸಲು ಈ  ಅರ್ಜಿಯನ್ನು ತುಂಬಿರಿ.
 - 
https://docs.google.com/forms/d/e/1FAIpQLSevqRdFngjbDtOF8YxgeXeL8xF62rdXuLpGJIhK6qzMaJ_Dcw/viewform
2. ಇಮೇಲ್ ಕಳುಹಿಸುವಾಗ ಗಮನಿಸಬೇಕಾದ ಕೆಲವು ಮಾರ್ಗಸೂಚಿಗಳನ್ನು ಇಲ್ಲಿ ನೋಡಿ.
-http://karnatakaeducation.org.in/KOER/index.php/ವಿಷಯಶಿಕ್ಷಕರವೇದಿಕೆ_ಸದಸ್ಯರ_ಇಮೇಲ್_ಮಾರ್ಗಸೂಚಿ
3. ಐ.ಸಿ.ಟಿ ಸಾಕ್ಷರತೆ ಬಗೆಗೆ ಯಾವುದೇ ರೀತಿಯ ಪ್ರಶ್ನೆಗಳಿದ್ದಲ್ಲಿ ಈ ಪುಟಕ್ಕೆ ಭೇಟಿ ನೀಡಿ -
http://karnatakaeducation.org.in/KOER/en/index.php/Portal:ICT_Literacy
4.ನೀವು ಸಾರ್ವಜನಿಕ ತಂತ್ರಾಂಶ ಬಳಸುತ್ತಿದ್ದೀರಾ ? ಸಾರ್ವಜನಿಕ ತಂತ್ರಾಂಶದ ಬಗ್ಗೆ ತಿಳಿಯಲು 
-http://karnatakaeducation.org.in/KOER/en/index.php/Public_Software
-----------
--- 
You received this message because you are subscribed to the Google Groups 
"EnglishSTF" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to englishstf+unsubscr...@googlegroups.com.
To post to this group, send an email to englishstf@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to