Jump to content
Join the Unexplained Mysteries community today! It's free and setting up an account only takes a moment.
- Sign In or Create Account -

Huge cyber Attack Spreading in Europe


susieice

Recommended Posts

It seems Russia is being hit the hardest at present, but the attack is spreading rapidly. Some companies in the US are being affected.

http://www.cbsnews.com/news/cyberattack-ransomware-ukraine-websites-hackers-similar-wannacry-malware/

First link must be older. Seems it's spread even to Australia.

http://www.reuters.com/article/us-cyber-attack-idUSKBN19I1TD

Some US links to news, I can't seem to open.

Edited by susieice
  • Like 2
Link to comment
Share on other sites

 

CNN just reported that this virus has no kill switch and it's possible that even if ransom is paid the companies may not be able to retrieve their files. I guess this started yesterday.

http://money.cnn.com/2017/06/28/technology/ransomware-attack-petya-what-you-need-to-know/index.html?iid=hp-toplead-intl&sr=fbtech062817ansomware-attack-petya-what-you-need-to-know0623AMVODtopLink&linkId=39178567

Edited by susieice
  • Like 3
Link to comment
Share on other sites

This is what the BBC are reporting -

Quote

A global cyber-attack that affected companies around the world may have started via corrupted updates on a piece of accountancy software.

Fingers are increasingly pointing to a piece of Ukrainian tax-filing software, MEDoc, as the source of the infection, although the company denies it.

Malware generally infiltrates networks via email attachments that users click on in error.

Microsoft described the method as "a recent dangerous trend".

http://www.bbc.co.uk/news/technology-40428967

 

  • Like 1
Link to comment
Share on other sites

Apparently, it can sit dormant for awhile on a hard drive. No one knows who else could be infected or if the systems can ever be recovered. It appears Russia was the original target.

https://www.nytimes.com/2017/06/27/technology/global-ransomware-hack-what-we-know-and-dont-know.html

  • Like 1
Link to comment
Share on other sites

2 hours ago, susieice said:

Apparently, it can sit dormant for awhile on a hard drive. No one knows who else could be infected or if the systems can ever be recovered. It appears Russia was the original target.

https://www.nytimes.com/2017/06/27/technology/global-ransomware-hack-what-we-know-and-dont-know.html

 

In my own opinion, this one is a lot closer to what could be the truth: 

 

https://www.ft.com/content/4676e57e-5b72-11e7-b553-e2df1b0c3220?mhq5j=e1

 

 

Link to comment
Share on other sites

7 hours ago, Helen of Annoy said:

Not really. The ransom is only $300 anyway.

http://www.foxbusiness.com/features/2017/06/28/new-highly-virulent-strain-ransomware-cripples-networks.html

Edited by susieice
Link to comment
Share on other sites

4 hours ago, susieice said:

I'm not sure what an off-site backup costs but that seems the best tactic for businesses to follow.  Sure, it could cost a lot in replacing hardware but at least they wouldn't lose data.  I'm thinking of doing something like that for my own system, even though it's only personal stuff, no business.

  • Like 1
Link to comment
Share on other sites

I was thinking companies that big would have a backup for their systems somewhere. I'm bad at that too, but I'm not a multi-billion dollar corporation. With the emails closed they couldn't pay the $300 if they wanted to.

Link to comment
Share on other sites

12 hours ago, susieice said:

Nope. It's not. The address was taken down almost immediately. And even some of those who paid remained locked. 

Sorry for no link, these facts are virtually everywhere in the news, with everyone free to think what they will about it. 

 

Link to comment
Share on other sites

On 29/06/2017 at 7:10 AM, and then said:

I'm not sure what an off-site backup costs but that seems the best tactic for businesses to follow.  Sure, it could cost a lot in replacing hardware but at least they wouldn't lose data.  I'm thinking of doing something like that for my own system, even though it's only personal stuff, no business.

My only thought is this is, since these things can lie dormant, that the backups could be infected too.

  • Like 1
Link to comment
Share on other sites

 

Looks like it were Russians targeting Ukraine, rest (including few Russian companies)- just collateral damage.

 

  • Like 1
Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.