Focus on defences as users scramble after global cyberattack

Published June 29, 2017
A woman passes by cash machines not working in a city supermarket in Kiev on Wednesday.—AP
A woman passes by cash machines not working in a city supermarket in Kiev on Wednesday.—AP

KIEV: Thousands of computer users across the globe scrambled to reboot on Wednesday as calls grew to step up defences after a fresh wave of ransomware cyberattacks spread from Ukraine and Russia worldwide.

The virus, which demanded a payment worth $300 as it locked up files at companies and government agencies including the Chernobyl nuclear site, was reminiscent of the WannaCry ransomware that swept the world last month, hitting more than 200,000 users in more than 150 countries.

But the new attack appeared much smaller in scale, with global cybersecurity firm Kaspersky Lab estimating the number of victims at 2,000.

There was no immediate indication of who was responsible.

The director of European police agency Europol, Rob Wainwright, said there were “clear similarities” with the WannaCry incident but warned that there were also “indications of a more sophisticated attack capability intended to exploit a range of vulnerabilities”.

Some IT specialists identified the newcomer as “Petrwrap”, a modified version of ransomware called Petya which circulated last year. But Kaspersky described it as a new form of ransomware.

And after a fresh cyberattack challenged security worldwide for the second time in just a few months there were international demands for greater focus on battling the issue.

Nato chief Jens Stoltenberg said the situation “underlines the importance of strengthening our cyber defences” as he warned hacking attacks could potentially trigger the US-led bloc’s mutual defence commitment.

Meanwhile, Kremlin spokesman Dmitry Peskov said the incident proves Russian demands for “cooperation” were justified as “no country can now effectively deal with the cyber-threat alone”.

In Ukraine, where the attacks were first reported and appeared most severe, the government said the attack had been halted by Wednesday morning, but key organisations were still reporting problems.

Despite the assurances, employees at the Chernobyl nuclear site were continuing to use hand-held Geiger counters to measure radiation levels after the monitoring system was shut down by the hack.

Online arrivals and departures information for Kiev’s main Boryspil airport also remained down, but its director said the hub was otherwise fully operational.

Meanwhile, systems at the major lender Oschadbank still appeared crippled, while a delivery service and energy supplier said they were also facing some difficulties.

Global spread

The attacks started on Tuesday at around 2pm in Kiev (1100 GMT) and quickly spread to about 80 companies in Ukraine and Russia, said cybersecurity company Group IB.

In Russia, major companies including the oil giant Rosneft said they had suffered cyberattacks at roughly the same time.

Later, multinationals in Western Europe and the United States reported that they too had been hit by the virus.

Among the companies reporting problems were global shipping firm Maersk, British advertising giant WPP, French industrial group Saint-Gobain and US pharmaceutical group Merck.

India’s government said operations at a terminal at the country’s largest container port in Mumbai, run by Maersk, were disrupted.

In the Netherlands one of Europe’s largest container terminals at Rotterdam was forced to switch to manual operations Wednesday due to the attack.

Windows vulnerability

Security specialists said the cyberattacks on Tuesday exploited an already patched vulnerability in Windows software and appeared to have focused on Ukraine as a primary target.

The malware that, once in a computer, locked away data from users who were then told to pay, bore resemblances to the recent WannaCry attack. US software titan Microsoft also called the latest virus ransomware.

“Our initial analysis found that the ransomware uses multiple techniques to spread, including one which was addressed by a security update previously provided for all platforms from Windows XP to Windows 10 (MS17-010),” a Microsoft spokesperson told AFP.

After the WannaCry scourge in May, Microsoft urged users to protect machines with the MS17-010 patch.

The flaw — and the means to exploit it — had previously been disclosed in pirated documents about cyberweapons at the US National Security Agency.

Published in Dawn, June 29th, 2017

Opinion

Editorial

Border clashes
19 May, 2024

Border clashes

THE Pakistan-Afghanistan frontier has witnessed another series of flare-ups, this time in the Kurram tribal district...
Penalising the dutiful
19 May, 2024

Penalising the dutiful

DOES the government feel no remorse in burdening honest citizens with the cost of its own ineptitude? With the ...
Students in Kyrgyzstan
19 May, 2024

Students in Kyrgyzstan

BEING stranded on foreign shores is hardly an agreeable experience. And if the environment is hostile — as it...
Ominous demands
Updated 18 May, 2024

Ominous demands

The federal government needs to boost its revenues to reduce future borrowing and pay back its existing debt.
Property leaks
18 May, 2024

Property leaks

THE leaked Dubai property data reported on by media organisations around the world earlier this week seems to have...
Heat warnings
18 May, 2024

Heat warnings

STARTING next week, the country must brace for brutal heatwaves. The NDMA warns of severe conditions with...