USEUROPEAFRICAASIA 中文雙語Fran?ais
    Business
    Home / Business / Technology

    Ransom virus slowing, cyber security awareness promoted

    By Zhu Lingqing | chinadaily.com.cn | Updated: 2017-05-16 16:43

    Ransom virus slowing, cyber security awareness promoted

    The ransomware virus, dubbed WannaCry, can encrypt all the files on a Windows PC and demands $300 worth of bitcoin, an untraceable digital currency widely used online, to unlock a user's data. [Photo/VCG]

    Cyber security emergency response appears to have prevented a fresh round of attack from a ransomware virus that has hit more than 300,000 computers across the world.

    The cyber security industry were fearful of a 'black Monday', as many workers switched on their computers after the weekend.

    "A large-scale infection has been avoided, thanks to a 72-hour national mobilization and emergency response led by the authorities and supported by the industry," leading domestic cyber security company 360 Business Security Group said.

    The ransomware virus, dubbed WannaCry, can encrypt all the files on a Windows PC and demands $300 worth of bitcoin, an untraceable digital currency widely used online, to unlock a user's data.

    A Cybercpace Administration of China official said on Monday, that although the virus is still spreading, it has slowed.

    "After the virus breakout, the authorities immediately made arrangements for cyber security guards and domestic cyber security companies to proactively provide security services and preventive tools," the official said.

    Wu Yunkun, president of 360 Business Security Group, told chinadaily.com.cn to curb the virus's spread, the company had provided eight versions of warning notices, seven repair guides and six repair tools to their government and enterprises customers as of Monday morning.

    The ransomware cyber attack, which is believed to be the largest global cyber attack in history, has hit 300,000 victims in at least 150 countries since Friday, making $70,000 worth of bitcoin, White House official Tom Bossert said, China News Service reported.

    The report said that in China, more than 29,000 IPs were infected by the virus from Friday to Saturday, most of which were universities, hospitals, transport systems and companies.

    The National Computer Network Emergency Response Technical Team/Coordination Center of China (CNCERT/CC) had found 2.42 million IPs were suffering the attack and the number of infected IPs reached 35,000 as of 10:30 am on Sunday, Xinhua reported.

    Jiangsu, Zhejiang, Guangdong and Jiangxi province were most affected, a report released by 360 Threat Intelligence Center on Saturday said.

    "What is new about the WannaCry ransomware virus, which can worm its way into Windows PCs and propagate automatically through systems, is its attack on intranets," Wu said.

    "The Transmission Control Protocol port 445 of Windows system, which is widely acknowledged unsafe, is closed on many computers. However, it is usually open on intranets used in many industries and enterprises because they think their intranets can be isolated with the extranet."

    Wu said that is why universities, organizations and enterprises were especially vulnerable to the ransomware.

    "Code for exploiting that bug, which is known as "Eternal Blue" in Microsoft's Windows operating system, was released on the internet in March and Microsoft released patches last month," Wu noted.

    He said domestic cyber security companies like 360 Business Security Group reminded users to install patches via security software in March, but many users ignored the fix.

    "The case is a test of the cyber security defending system in China. Although cyber security is considered to be at a national strategy level, domestic institutions and enterprises' overall security awareness is still not strong."

    Brad Smith, president and chief legal officer of Microsoft, also said the cyber attack is "a wake-up call for all of us, whether we're in the tech sector, as customers or as government", according to a PBS report.

    At present, the so-called "kill switch" for the attack, discovered by a young British cybersecurity researcher, is no longer effective.

    As new versions of the virus such as WannaCry 2.0 have already begun emerging, any respite might be brief.

    Most Viewed in 24 Hours
    Copyright 1995 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
    License for publishing multimedia online 0108263

    Registration Number: 130349
    FOLLOW US
    无码少妇一区二区性色AV| 最近中文字幕大全免费视频| 超碰97国产欧美中文| 久久激情亚洲精品无码?V| 中文字幕丰满乱孑伦无码专区 | 日本久久中文字幕| 久久国产精品无码网站| 色综合AV综合无码综合网站| 乱人伦中文无码视频在线观看 | 精品无码国产自产在线观看水浒传 | 亚洲熟妇中文字幕五十中出| 国产AV无码专区亚汌A√| 中文字幕乱偷无码AV先锋| 无码国产精品一区二区免费式直播| 中文无码制服丝袜人妻av| 亚洲精品无码久久不卡| 精品无码久久久久久久久久| 国产拍拍拍无码视频免费| 无套内射在线无码播放| 亚洲熟妇无码乱子AV电影| 国产成人亚洲综合无码| 中文字幕乱偷无码AV先锋| 国产成人无码一区二区三区在线| 日韩人妻无码一区二区三区 | 中文字幕av日韩精品一区二区| 亚洲人成中文字幕在线观看| 亚洲中文字幕无码久久2020| 色婷婷久久综合中文久久蜜桃av | 佐佐木明希一区二区中文字幕| 狠狠躁天天躁无码中文字幕| 色婷婷综合久久久中文字幕| 久久久久成人精品无码中文字幕| 日本免费中文字幕| 日本中文一区二区三区亚洲| 最近中文字幕大全2019| 国产成人无码av| 无码人妻熟妇AV又粗又大 | 午夜无码国产理论在线| 无码精品蜜桃一区二区三区WW| 亚洲av午夜国产精品无码中文字| 亚洲成av人片不卡无码久久|