However, Wannacry has proved less severe than anticipated in Asia
The global Ransomware Attack has affected several computers of a state power distribution company in West Bengal but the central government computer system has largely escaped, officials said on Monday.
State agencies that manage government websites and build supercomputers have installed security patches issued by Microsoft Corp.
Federal Minister Ravi Shankar Prasad told reporters that there was no serious impact on India, with only isolated incidents in parts of Kerala and Andhra Pradesh states, and the government was monitoring the situation.
However, West Bengal Power Minister Sovandev Chattopadhyay told Reuters that several billing centres of the state’s Electricity Distribution Company Ltd (WBSEDCL) had been infected by the ransomware worm.
Related Articles :
“The full extent and magnitude of the problem will be realised by tomorrow,” he said, the situation will be very serious if household electricity consumption data from the central server of the utility could not be retrieved beforehand.
A power department official who did not want to be named said billing for around 800,000 households was affected when the ransomware blocked access to files in the computers.
A senior official at the Federal Ministry of Electronics and Information Technology said its Computer Emergency Response Team was gathering all possible information about the ransomware. Read more
WannaCry – “ransomware” has locked up more than 200,000 computers in more than 150 countries
Officials across the globe scrambled over the weekend to catch the culprits behind a massive ransomware worm that disrupted operations at car factories, hospitals, shops and schools, while Microsoft on Sunday pinned blame on the US government for not disclosing more software vulnerabilities.
Cyber security experts said the spread of the worm dubbed WannaCry – “ransomware” that locked up more than 200,000 computers in more than 150 countries – had slowed but that the respite might only be brief amid fears new versions of the worm will strike.
In a blog post on Sunday, Microsoft President Brad Smith appeared to tacitly acknowledge what researchers had already widely concluded: The ransomware attack leveraged a hacking tool, built by the US National Security Agency, that leaked online in April.
“This is an emerging pattern in 2017,” Smith wrote. “We have seen vulnerabilities stored by the CIA show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world.”
He also poured fuel on a long-running debate over how government intelligence services should balance their desire to keep software flaws secret – in order to conduct espionage and cyber warfare – against sharing those flaws with technology companies to better secure the internet.
“This attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem,” Smith wrote. He added that governments around the world should “treat this attack as a wake-up call” and “consider the damage to civilians that comes from hoarding these vulnerabilities and the use of these exploits.” Read more