為達最佳瀏覽效果,建議使用 Chrome、Firefox 或 Microsoft Edge 的瀏覽器。

請至Edge官網下載 請至FireFox官網下載 請至Google官網下載
晴時多雲

限制級
您即將進入之新聞內容 需滿18歲 方可瀏覽。
根據「電腦網路內容分級處理辦法」修正條文第六條第三款規定,已於網站首頁或各該限制級網頁,依台灣網站分級推廣基金會規定作標示。 台灣網站分級推廣基金會(TICRF)網站:http://www.ticrf.org.tw

《TAIPEI TIMES 焦點》 Attack affects computer systems worldwide


An electronic display calls on people to watch the analogue timetable at a railway station in Frankfurt, Germany, yesterday after a cyberattack affected railway operator Deutsche Bahn.
Photo: AP

An electronic display calls on people to watch the analogue timetable at a railway station in Frankfurt, Germany, yesterday after a cyberattack affected railway operator Deutsche Bahn. Photo: AP

2017/05/14 03:00

HOSPITALS, SCHOOLS: Splunk director of threat research Rich Barger said: ‘This is one of the largest global ransomware attacks the cybercommunity has ever seen’

/ Reuters and AP, LONDON and MADRID

A global cyberattack leveraging hacking tools believed to have been developed by the US National Security Agency (NSA) infected tens of thousands of computers in nearly 100 countries, including Taiwan, disrupting Britain’s health system and global shipper FedEx.

Extortionists tricked people into opening malware attachments to spam e-mails that appeared to contain invoices, job offers, security warnings and other legitimate files.

The ransomware encrypted data on the computers, demanding payments of US$300 to US$600 to restore access.

Security researchers said they observed some people paying via the digital currency bitcoin, although they did not know what percent had given in to the extortionists.

Researchers with security software maker Avast said they had observed 57,000 infections in 99 countries, with Taiwan, Russia and Ukraine the top targets.

Asian countries reported no major breaches yesterday, but officials in the region were scrambling to check and the full extent of the damage might not be known for some time.

China’s Xinhua news agency said some secondary schools and universities had been affected, without specifying how many or identifying them.

The most disruptive attacks were reported in Britain, where hospitals and clinics were forced to turn away patients after losing access to computers on Friday.

International shipper FedEx Corp said some of its Windows computers were also infected.

“We are implementing remediation steps as quickly as possible,” FedEx said in a statement.

Only a small number of US-headquartered organizations were hit, because the hackers appear to have begun the campaign by targeting organizations in Europe, said Vikram Thakur, research manager with security software maker Symantec.

By the time they turned their attention to the US, spam filters had identified the new threat and flagged the ransomware-laden e-mails as malicious, Thakur said.

Infections of the worm appeared to have fallen off significantly after a security researcher bought a domain that the malware was connecting to, by chance undermining its effectiveness.

“The numbers are extremely low and coming down fast,” he said, but added that any change in the original code could lead to another flare up.

The US Department of Homeland Security said late on Friday that it was aware of reports of the ransomware, was sharing information with domestic and foreign partners, and was ready to lend technical support.

Telecom company Telefonica was among many targets in Spain, though it said the attack was limited to some computers on an internal network and had not affected clients or services.

Portugal Telecom and Telefonica Argentina both said they were also targeted.

Private security firms identified the ransomware as a new variant of “WannaCry” that had the ability to automatically spread across large networks by exploiting a known bug in Microsoft’s Windows operating system.

The hackers, who have not come forward to claim responsibility or otherwise been identified, likely made it a “worm,” or self-spreading malware, by exploiting a piece of NSA code known as “Eternal Blue” that was released last month by a group known as the Shadow Brokers, researchers with several private cybersecurity firms said.

“This is one of the largest global ransomware attacks the cybercommunity has ever seen,” said Rich Barger, director of threat research with Splunk, one of the firms that linked WannaCry to the NSA.

The Shadow Brokers released Eternal Blue as part of a trove of hacking tools that they said belonged to the US spy agency.

Microsoft said it was pushing out automatic Windows updates to defend clients from WannaCry. It issued a patch on March 14 to protect them from Eternal Blue.

Britain’s National Cyber Security Center said teams were working “round the clock” to restore computer systems after hospitals had to cancel or delay treatment for patients.

British Home Secretary Amber Rudd said that 45 public health organizations were hit, but she stressed that no patient data had been stolen.

The attack froze computers at hospitals across the country, with some canceling all routine procedures.

新聞來源:TAIPEI TIMES

不用抽 不用搶 現在用APP看新聞 保證天天中獎  點我下載APP  按我看活動辦法

焦點今日熱門
看更多!請加入自由時報粉絲團

網友回應

載入中
此網頁已閒置超過5分鐘,請點擊透明黑底或右下角 X 鈕。