Focus on defences as users scramble after global cyberattack

Published June 29, 2017
A woman passes by cash machines not working in a city supermarket in Kiev on Wednesday.—AP
A woman passes by cash machines not working in a city supermarket in Kiev on Wednesday.—AP

KIEV: Thousands of computer users across the globe scrambled to reboot on Wednesday as calls grew to step up defences after a fresh wave of ransomware cyberattacks spread from Ukraine and Russia worldwide.

The virus, which demanded a payment worth $300 as it locked up files at companies and government agencies including the Chernobyl nuclear site, was reminiscent of the WannaCry ransomware that swept the world last month, hitting more than 200,000 users in more than 150 countries.

But the new attack appeared much smaller in scale, with global cybersecurity firm Kaspersky Lab estimating the number of victims at 2,000.

There was no immediate indication of who was responsible.

The director of European police agency Europol, Rob Wainwright, said there were “clear similarities” with the WannaCry incident but warned that there were also “indications of a more sophisticated attack capability intended to exploit a range of vulnerabilities”.

Some IT specialists identified the newcomer as “Petrwrap”, a modified version of ransomware called Petya which circulated last year. But Kaspersky described it as a new form of ransomware.

And after a fresh cyberattack challenged security worldwide for the second time in just a few months there were international demands for greater focus on battling the issue.

Nato chief Jens Stoltenberg said the situation “underlines the importance of strengthening our cyber defences” as he warned hacking attacks could potentially trigger the US-led bloc’s mutual defence commitment.

Meanwhile, Kremlin spokesman Dmitry Peskov said the incident proves Russian demands for “cooperation” were justified as “no country can now effectively deal with the cyber-threat alone”.

In Ukraine, where the attacks were first reported and appeared most severe, the government said the attack had been halted by Wednesday morning, but key organisations were still reporting problems.

Despite the assurances, employees at the Chernobyl nuclear site were continuing to use hand-held Geiger counters to measure radiation levels after the monitoring system was shut down by the hack.

Online arrivals and departures information for Kiev’s main Boryspil airport also remained down, but its director said the hub was otherwise fully operational.

Meanwhile, systems at the major lender Oschadbank still appeared crippled, while a delivery service and energy supplier said they were also facing some difficulties.

Global spread

The attacks started on Tuesday at around 2pm in Kiev (1100 GMT) and quickly spread to about 80 companies in Ukraine and Russia, said cybersecurity company Group IB.

In Russia, major companies including the oil giant Rosneft said they had suffered cyberattacks at roughly the same time.

Later, multinationals in Western Europe and the United States reported that they too had been hit by the virus.

Among the companies reporting problems were global shipping firm Maersk, British advertising giant WPP, French industrial group Saint-Gobain and US pharmaceutical group Merck.

India’s government said operations at a terminal at the country’s largest container port in Mumbai, run by Maersk, were disrupted.

In the Netherlands one of Europe’s largest container terminals at Rotterdam was forced to switch to manual operations Wednesday due to the attack.

Windows vulnerability

Security specialists said the cyberattacks on Tuesday exploited an already patched vulnerability in Windows software and appeared to have focused on Ukraine as a primary target.

The malware that, once in a computer, locked away data from users who were then told to pay, bore resemblances to the recent WannaCry attack. US software titan Microsoft also called the latest virus ransomware.

“Our initial analysis found that the ransomware uses multiple techniques to spread, including one which was addressed by a security update previously provided for all platforms from Windows XP to Windows 10 (MS17-010),” a Microsoft spokesperson told AFP.

After the WannaCry scourge in May, Microsoft urged users to protect machines with the MS17-010 patch.

The flaw — and the means to exploit it — had previously been disclosed in pirated documents about cyberweapons at the US National Security Agency.

Published in Dawn, June 29th, 2017

Opinion

Editorial

Digital growth
Updated 25 Apr, 2024

Digital growth

Democratising digital development will catalyse a rapid, if not immediate, improvement in human development indicators for the underserved segments of the Pakistani citizenry.
Nikah rights
25 Apr, 2024

Nikah rights

THE Supreme Court recently delivered a judgement championing the rights of women within a marriage. The ruling...
Campus crackdowns
25 Apr, 2024

Campus crackdowns

WHILE most Western governments have either been gladly facilitating Israel’s genocidal war in Gaza, or meekly...
Ties with Tehran
Updated 24 Apr, 2024

Ties with Tehran

Tomorrow, if ties between Washington and Beijing nosedive, and the US asks Pakistan to reconsider CPEC, will we comply?
Working together
24 Apr, 2024

Working together

PAKISTAN’S democracy seems adrift, and no one understands this better than our politicians. The system has gone...
Farmers’ anxiety
24 Apr, 2024

Farmers’ anxiety

WHEAT prices in Punjab have plummeted far below the minimum support price owing to a bumper harvest, reckless...