Global alert as cyber attack spreads to 99 countries

A woman points to the website of the UK National Health Service. Hackers used cyberweapons stolen from the US National Security Agency to strike organisations across the globe on Friday including several British hospitals. PHOTO | DANIEL LEAL-OLIVAS | AFP

What you need to know:

  • The attacks came in the form of ransomware, a technique used by hackers that locks users' files unless they pay the attackers a designated sum in the virtual currency Bitcoin.
  • The malware's name is WCry, but analysts were also using variants such as WannaCry.
  • The UK's state-run National Health Service declared a "major incident" after the attack, which forced some hospitals to divert ambulances and scrap operations.

LONDON

A fast-moving wave of cyberattacks swept the globe Friday, apparently exploiting a flaw exposed in documents leaked from the US National Security Agency.

The attacks came in the form of ransomware, a technique used by hackers that locks users' files unless they pay the attackers a designated sum in the virtual currency Bitcoin.

The scope of the attacks was not immediately clear, but some analysts reported that dozens of countries had been affected, with the malware linked to attacks on hospitals in Britain as well as the Spanish telecom giant Telefonica and the US delivery firm FedEx.

The US Department of Homeland Security's computer emergency response team said it was aware of ransomware infections "in several countries around the world."

"We are now seeing more than 75,000 detections... in 99 countries," Jakub Kroustek of the security firm Avast said in a blog post around 2000 GMT.

Earlier, Kaspersky researcher Costin Raiu cited 45,000 attacks in 74 countries, saying that the malware, a self-replicating "worm," was spreading quickly.

Forcepoint Security Labs said that "a major malicious email campaign" consisting of nearly five million emails per hour was spreading the new ransomware.

The malware's name is WCry, but analysts were also using variants such as WannaCry.

Forcepoint said in a statement that the attack had "global scope", affecting organisations in Australia, Belgium, France, Germany, Italy and Mexico.

In the United States, FedEx acknowledged it had been hit by malware and was "implementing remediation steps as quickly as possible."

The UK's state-run National Health Service declared a "major incident" after the attack, which forced some hospitals to divert ambulances and scrap operations.

In Spain, major firms including Telefonica were hit, with employees told to shut down workstations immediately through megaphone announcements.

'DIRECT INFECTION'

At least 16 organisations within the NHS, some of them responsible for several hospitals each, reported being targeted.

"We are aware that a number of NHS organisations have reported that they have suffered from a ransomware attack. This is not targeted at the NHS, it's an international attack and a number of countries and organisations have been affected," said Prime Minister Theresa May.

Britain's National Cyber Security Centre and its National Crime Agency were looking into the UK incidents.

Pictures posted on social media showed screens of NHS computers with images demanding payment of $300 (275 euros) in Bitcoin, saying: "Ooops, your files have been encrypted!"

It demands payment in three days or the price is doubled, and if none is received in seven days, the files will be deleted, according to the screen message.

A hacking group called Shadow Brokers released the malware in April claiming to have discovered the flaw from the NSA, Kaspersky said.

Although Microsoft released a security patch for the flaw earlier this year, many systems have yet to be updated, researchers said.

"Unlike most other attacks, this malware is spreading primarily by direct infection from machine to machine on local networks, rather than purely by email," Lance Cottrell, chief scientist at the US technology group Ntrepid.

"The ransomware can spread without anyone opening an email or clicking on a link."

AMBULANCES DIVERTED

NHS Incident Director Anne Rainsberry urged the British public to "use the NHS wisely while we deal with this major incident which is still ongoing".

The sort of ransom demands seen on the NHS screens are not without precedent at medical facilities. In February 2016, a Los Angeles hospital, the Hollywood Presbyterian Medical Center, paid $17,000 in Bitcoin to hackers who took control of its computers for more than a week.

"Ransomware becomes particularly nasty when it infects institutions like hospitals, where it can put people's lives in danger," said Kroustek, the Avast analyst.

A spokesman for Barts Health NHS Trust in London said it was experiencing "major IT disruption" and delays at all four of its hospitals.

"We have activated our major incident plan to make sure we can maintain the safety and welfare of patients," the spokesman said. "Ambulances are being diverted to neighbouring hospitals."

Two employees at St Bartholomew's Hospital, which is part of Barts Health, said that all the computers in the hospital had been turned off.

Caroline Brennan, 41, went to the hospital to see her brother, who had open heart surgery.

"They told us there was a problem. They said the system was down and that they cannot transfer anyone till the computer system was back up so he is still in the theatre."