More than 200,000 computers have been affected so far. No federal systems were affected.
Healthcare organizations still carry risk because many still operate devices that use older, unsupported versions of Microsoft operating systems.
There are a total of 2.2 lakh ATMs in India, of which few may be running on old Windows XP.
Weidman said that the best way to protect industrial systems that can't be updated is to place them on isolated network segments that don't have direct access to the Internet. He estimates Microsoft will generate earnings-per-share of $3.35 in fiscal 2018 compared to the Wall Street consensus of $3.31. Last year, 75% of crypto ransomware-malware that encrypts files on the target machine to force its owner to pay a ransom in exchange for their decryption-originated from the Russian-speaking hacker underworld.
Lee Kim, director of privacy and security for HIMSS North America, contends that there have been anecdotal reports by healthcare providers around the world-including the USA -of infections affecting their computers and medical devices.
Cyber bad guys have spread ransomware, known as WannaCry, to computers around the world. "We've seen cases where organizations never got a decryption key after having paid the ransom", Trainor said. "In terms of awareness and impact on people, it's probably been the biggest one so far".
Likewise, Reg Harnish, CEO of GreyCastle Security, comments that "it's tough to think of another ransomware situation that has been this impactful".
Kim calls WannaCry the world's first ransomworm-ransomware with the ability to self-propagate without user intervention or interaction. The software is WannaCry ransomware which took over the machines of more than 150 countries including India. Since then, Microsoft has issued new updates specifically for the WannaCry attacks and copycat attacks. "Make sure your IT service providers or IT folks within your organizations are patching your software-that's the bottom line", added Bossert.
Microsoft said it had taken the "highly unusual step" of releasing a patch for computers running older operating systems including Windows XP, Windows 8 and Windows Server 2003. And while Microsoft said it had already released a security update to patch the vulnerability a month earlier, it would appear that the NSA hadn't told the U.S. tech giant about the security risk until after it had been stolen. "There are actually legitimate reasons to wait to patch your systems".
Unfortunately, not everyone can update their versions of Windows.
The company on Friday said it had added additional protection against the specific malware, and was working with affected customers.
Researchers at CyberX Labs, which specializes in industrial cyber-security, say that they've found a long list of vulnerable critical infrastructure ranging from power plants to hospitals, all with open SMBv1 ports showing up on Shodan.
Utah Valley University professor Robert Jorgensen, director of the school's cybersecurity program, said ransomware and other cyberattacks are likely going to be a continued part of the landscape for a world now intrinsically linked with, and lived on, digital networks.