- How to stream Steelers vs. 49ers in NFL Week 3 action 2 Years Ago
- How to stream Bills vs. Bengals in NFL Week 3 action 2 Years Ago
- Colt halts production of AR-15s for civilians Today 3:45 PM
- If you love long-winded, hashtag-heavy Instagram captions, these apps can help Today 2:54 PM
- Teen girls on TikTok have convinced the internet that they eat their tampons Today 2:33 PM
- Twitch streamer faces criticism for trying to defend racist jokes Today 2:03 PM
- How to stream Raiders vs. Vikings in Week 3 Today 12:55 PM
- NRA calls Beto O’Rourke ‘AR-15 salesman of the month’ in wake of buyback proposal Today 12:03 PM
- After 23 deaths, Sean Bean is tired of getting killed on-screen Today 11:48 AM
- Stephen Miller has a girlfriend—and people are stunned Today 11:35 AM
- Mickey Rourke says Robert De Niro iced him out of ‘The Irishman’ Today 11:07 AM
- Conservative men are melting down over Elizabeth Warren’s speech Today 10:40 AM
- People are calling rapper Tekashi 69 a ‘snitch’ for outing gang members Today 10:16 AM
- Greta Thunberg tells Congress to ‘listen to the scientists’ about climate crisis Today 9:55 AM
- Maybe we should start taking Tom DeLonge seriously about UFOs Today 9:11 AM
A widespread cybersecurity attack using leaked NSA hacking tools is infecting computers in tens of thousands of locations throughout the world, according to a BBC report. The infected software appears to be launching a large-scale ransomware campaign against dozens of organizations, including hospitals and telecom companies.
The software in today’s massive attack, a variant of “Wanna Cry,” was spread via email, and demands $300 in Bitcoin. Reports of infected computers have been seen in as many as 99 countries, including the U.K., U.S., China, Russia, Spain, Italy, and Taiwan.
“Affected machines have six hours to pay up and every few hours the ransom goes up,” Kurt Baumgartner, the principal security researcher at Kaspersky Lab, told CNN. “Most folks that have paid up appear to have paid the initial $300 in the first few hours.”
The British National Health Service (NHS) is currently under siege and was forced to reject patients, cancel operations, and reschedule appointments. People needing medical attention in areas that were attacked by the ransomware have been told to seek care only in emergency situations, according to a report from Reuters.
“We are experiencing a major IT disruption and there are delays at all of our hospitals,” Barts Health Group, which manages major London hospitals, told Reuters.
British Prime Minister Theresa May was briefed on the incident earlier Friday morning. Sixteen U.K. organizations have been affected by the ongoing attack, according to the latest update from the NHS, which added that there is no evidence patient data has been accessed.
Pharmacist Chris Magquire wrote on Twitter that even a general practice facility had to shut down computers and begin writing with pen and paper.
All shut down in Yorkshire-even in GP practice. Back to handwriting notes while seeing patients without full histories! #nhscyberattack— Chris Maguire (@chris_magz) May 12, 2017
Jakub Kroustek, malware researcher at Avast, says there are 57,000 “Wanna Cry” detections so far, which are mainly being targeted to Russia, Ukraine, and Taiwan.
Here is a photo of how the ransomware appears on infected computers.
Other victims of the attack include Spanish telecom giant Telefónica, which said the infection was limited to some of its computers on an internal network and did not affect clients or services. Portugal Telecom and Russia’s MegaFon were infected as well.
Delivery company FedEx was also a target, though it didn’t specify in which regions.
“Like many other companies, FedEx is experiencing interference with some of our Windows-based systems caused by malware,” it said in a statement. “We are implementing remediation steps as quickly as possible.”
The malware campaign is growing into one of the largest attacks in history.
“This is a major cyberattack, impacting organizations across Europe at a scale I’ve never seen before,” security architect Kevin Beaumont told the BBC.
Many security researchers have linked the attack to leaked NSA tools used to exploit vulnerabilities in Microsoft Windows computers. A group that calls itself “The Shadow Brokers” claims to have stolen hacking tools from the NSA, and started posting them online last year. In March, Microsoft says it released a patch for its Windows operating system that fixed flaws that made it vulnerable to the hacking tools, though many computers have not been updated with the latest software.
The incident highlights problems groups have protecting sensitive information. Organizations that have the responsibility of keeping customer’s sensitive records safe can often avoid being targeted by attacks like ‘Wanna Cry’ by simply keeping their systems up-to-date.
Phillip Tracy is a former technology staff writer at the Daily Dot. He's an expert on smartphones, social media trends, and gadgets. He previously reported on IoT and telecom for RCR Wireless News and contributed to NewBay Media magazine. He now writes for Laptop magazine.