Monday blues as ‘WannaCry’ hits at workweek’s start

President Vladimir Putin denied Russia had anything to do with an attack that hit hundreds of thousands of computers.

Powered by automated translation

LONDON // The world’s biggest ransomware attack levelled off in Europe on Monday due to a pushback by cyber security officials after causing havoc in 150 countries, as Microsoft urged governments to heed the “wake-up call”.

President Vladimir Putin denied Russia, which has been accused of cyber meddling in several countries around the world in recent years, had anything to do with an attack that hit hundreds of thousands of computers.

“Microsoft’s leadership stated this directly, they said the source of the virus was the special services of the United States,” Mr Putin said on the sidelines of a summit in Beijing.

Mr Putin said the incident was “worrisome” but had done “no significant damage” in Russia and called for urgent international talks on countering the hackers.

“A protection system ... needs to be worked out,” he said.

Brad Smith, Microsoft’s president and chief legal officer, said the code used in the attack was originally developed by the US National Security Agency.

He warned governments against stockpiling such code and said instead they should report vulnerabilities to manufacturers – not sell, store or exploit them, lest they fall into the wrong hands.

“An equivalent scenario with conventional weapons would be the US military having some of its Tomahawk missiles stolen,” Mr Smith wrote.

“The governments of the world should treat this attack as a wake-up call.”

But global fears eased on Monday as the number of incidents reported levelled off.

The cross-border police agency Europol said the situation was now stable, defusing concerns that attacks that struck computers in British hospital wards, European car factories and Russian banks would spread further at the start of the working week.

“The number of victims appears not to have gone up and so far the situation seems stable in Europe, which is a success,” senior spokesman for Europol, Jan Op Gen Oorth, said.

“It seems that a lot of internet security guys over the weekend did their homework and ran the security software updates,” he said.

The indiscriminate attack was unleashed on Friday, striking hundreds of thousands of computers worldwide by exploiting known vulnerabilities in older Microsoft computer operating systems.

US package delivery giant FedEx, Spanish telecoms giant Telefonica and Germany’s Deutsche Bahn rail network were among those hit in the attacks, which demanded money to allow users to unblock their computers.

In China, “hundreds of thousands” of computers were affected, including petrol stations, cash machines and universities, according to Qihoo 360, one of China’s largest providers of antivirus software.

French carmaker Renault said its Douai plant, one of its biggest sites in France employing 5,500 people, would be shut on Monday as systems were upgraded.

Europol executive director Rob Wainwright said the attack was “unprecedented”.

“We’ve never seen anything like this,” he said.

The attack blocks computers and puts up images on victims’ screens demanding payment of $300 (Dh1,100) in the virtual currency Bitcoin, saying: “Ooops, your files have been encrypted!”

Payment is demanded within three days or the price is doubled, and if none is received within seven days the locked files will be deleted, according to the screen message.

Bitcoin, the world’s most-used virtual currency, allows anonymous transactions via heavily encrypted codes.

Experts and governments alike warn against ceding to the demands and Mr Wainwright said few victims so far paid up.

Security firm Digital Shadows said transactions totalling $32,000 had taken place through Bitcoin addresses used by the ransomware.

The attack is unique, according to Europol, because it combines ransomware with a worm function, meaning once one machine is infected, the entire internal network is scanned and other vulnerable machines are infected.

The attack therefore spread faster than previous, smaller-scale ransomware attacks.

* Agence France-Presse