Experts say the spread of the virus had been stymied by a security researcher in the U.K. Hackers have issued new versions of the virus that cyber security organizations are actively trying to counter and stamp out. But experts say that hackers behind WannaCry are overloaded with decryption requests - in fact, many users who have paid the ransom are still waiting for their computer access to be restored. Infections can be spread through email attachments and links, so avoid clicking on any content inside a dodgy looking email. According to reports, more than 100 systems of the Andhra Pradesh police have been affected by the ransomware.
The country's cyber security agency has alerted Internet users against damaging activities of a strong and globally active ransomware virus- "Wannacry"- that critically infects workstations and locks them remotely. An unidentified young cybersecurity researcher claimed to help halt WannaCry's spread by activating a so-called "kill switch".
Once Microsoft released the patch for the vulnerability - exploited by hacker group "Shadow Brokers" after stealing a software from the US National Security Agency (NSA) - some Window XP users installed the update called "Microsoft Security Bulletin MS17-010" on their desktops and laptops. The malware primarily targeted users of Windows XP, which was launched by Microsoft in 2001. The company stopped supporting it - meaning that it issued no more updates, to fix problems - in 2014.
Fallon said he would not comment on reports Britain's submarines also run Windows XP software, saying only that the fleet is "fully protected". Brad Smith, the company's lawyer wrote on Microsoft's official blog: "An equivalent scenario with conventional weapons would be the US military having some of its Tomahawk missiles stolen". Repeatedly, exploits in the hands of governments have leaked into the public domain and caused widespread damage.
Authorities fear that new variations on the malware may begin spreading this week as more threat actors get their hands on the code and create new versions that behave differently but with the same effect.
The virus or malware behind the latest cyber-attack has been identified as "ransomware". "We are in the second wave", said Matthieu Suiche of Comae Technologies.
"(There have been) remarkably few payments so far that we've noticed as we are tracking this, so most people are not paying this, so there isn't a lot of money being made by criminal organisations so far".
Experts advise people not to pay, as it would only encourage the attackers, there is no guarantee that they will unblock files, and may result in them gaining access to victims' bank details.
Over the weekend almost 150 countries and over 300,000 computers were hit with various kinds of cyberattacks on computer systems large and small. However, the full extent of the attack won't be known until employees head back to work.
Indeed, there have been no reports of anyone getting their files back, despite almost 170 payments (about USA $50,000 at the time of writing) having been made to the bitcoin wallets associated with the ransomware.