Global EditionASIA 中文雙語Fran?ais
    Business
    Home / Business / Technology

    Ransom virus slowing, cyber security awareness promoted

    By Zhu Lingqing | chinadaily.com.cn | Updated: 2017-05-16 16:43
    Share
    Share - WeChat

    The ransomware virus, dubbed WannaCry, can encrypt all the files on a Windows PC and demands $300 worth of bitcoin, an untraceable digital currency widely used online, to unlock a user's data. [Photo/VCG]

    Cyber security emergency response appears to have prevented a fresh round of attack from a ransomware virus that has hit more than 300,000 computers across the world.

    The cyber security industry were fearful of a 'black Monday', as many workers switched on their computers after the weekend.

    "A large-scale infection has been avoided, thanks to a 72-hour national mobilization and emergency response led by the authorities and supported by the industry," leading domestic cyber security company 360 Business Security Group said.

    The ransomware virus, dubbed WannaCry, can encrypt all the files on a Windows PC and demands $300 worth of bitcoin, an untraceable digital currency widely used online, to unlock a user's data.

    A Cybercpace Administration of China official said on Monday, that although the virus is still spreading, it has slowed.

    "After the virus breakout, the authorities immediately made arrangements for cyber security guards and domestic cyber security companies to proactively provide security services and preventive tools," the official said.

    Wu Yunkun, president of 360 Business Security Group, told chinadaily.com.cn to curb the virus's spread, the company had provided eight versions of warning notices, seven repair guides and six repair tools to their government and enterprises customers as of Monday morning.

    The ransomware cyber attack, which is believed to be the largest global cyber attack in history, has hit 300,000 victims in at least 150 countries since Friday, making $70,000 worth of bitcoin, White House official Tom Bossert said, China News Service reported.

    The report said that in China, more than 29,000 IPs were infected by the virus from Friday to Saturday, most of which were universities, hospitals, transport systems and companies.

    The National Computer Network Emergency Response Technical Team/Coordination Center of China (CNCERT/CC) had found 2.42 million IPs were suffering the attack and the number of infected IPs reached 35,000 as of 10:30 am on Sunday, Xinhua reported.

    Jiangsu, Zhejiang, Guangdong and Jiangxi province were most affected, a report released by 360 Threat Intelligence Center on Saturday said.

    "What is new about the WannaCry ransomware virus, which can worm its way into Windows PCs and propagate automatically through systems, is its attack on intranets," Wu said.

    "The Transmission Control Protocol port 445 of Windows system, which is widely acknowledged unsafe, is closed on many computers. However, it is usually open on intranets used in many industries and enterprises because they think their intranets can be isolated with the extranet."

    Wu said that is why universities, organizations and enterprises were especially vulnerable to the ransomware.

    "Code for exploiting that bug, which is known as "Eternal Blue" in Microsoft's Windows operating system, was released on the internet in March and Microsoft released patches last month," Wu noted.

    He said domestic cyber security companies like 360 Business Security Group reminded users to install patches via security software in March, but many users ignored the fix.

    "The case is a test of the cyber security defending system in China. Although cyber security is considered to be at a national strategy level, domestic institutions and enterprises' overall security awareness is still not strong."

    Brad Smith, president and chief legal officer of Microsoft, also said the cyber attack is "a wake-up call for all of us, whether we're in the tech sector, as customers or as government", according to a PBS report.

    At present, the so-called "kill switch" for the attack, discovered by a young British cybersecurity researcher, is no longer effective.

    As new versions of the virus such as WannaCry 2.0 have already begun emerging, any respite might be brief.

    Top
    BACK TO THE TOP
    English
    Copyright 1995 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
    License for publishing multimedia online 0108263

    Registration Number: 130349
    FOLLOW US
    CLOSE
     
    久久有码中文字幕| 国产成人无码A区在线观看视频| 国产激情无码一区二区app| 欧美日韩中文字幕在线观看| 无码视频在线播放一二三区| 亚洲精品无码不卡在线播HE| 中文字幕本一道先锋影音| 亚洲成在人线在线播放无码| 免费无码毛片一区二区APP| 久久久久av无码免费网| 日本不卡中文字幕| 中文无码不卡的岛国片| 国产高清无码二区 | 熟妇人妻AV无码一区二区三区| 最近2019好看的中文字幕| 中文资源在线官网| 亚欧无码精品无码有性视频| 日韩人妻无码精品一专区| 中文字幕精品无码一区二区三区| 国产高清中文欧美| 波多野结衣在线aⅴ中文字幕不卡| 国产午夜无码专区喷水| 久久久久久国产精品免费无码 | 中文字幕日本精品一区二区三区 | 一区二区三区无码高清| 久久久人妻精品无码一区| 精品三级AV无码一区| 无码av免费一区二区三区| 水蜜桃av无码一区二区| 日韩人妻无码精品久久免费一| 亚洲AV无码成人精品区蜜桃| 国产丝袜无码一区二区三区视频| 国产中文在线亚洲精品官网| 最近更新2019中文字幕| 国产精品亚洲w码日韩中文| 日韩中文久久| 最新中文字幕av无码专区| 亚洲V无码一区二区三区四区观看 亚洲爆乳精品无码一区二区三区 亚洲爆乳无码一区二区三区 | 无码日韩人妻AV一区免费l | 最近2019中文免费字幕在线观看| 一本大道无码日韩精品影视|