In any case, the attack has been identified by the cybersecurity firm Proofpoint.
This story doesn't feel too surprising. The computers would operate normally, but the miner would also run in the background. Other breeds of malware may infect various operating systems, so no matter which device you are using, you should regularly update your software to install the latest security enhancements. Even though there are ways to install the latest updates on updates on Windows which are not genuine, Microsoft is also implementing restrictions every once in a while, so depending on the release, it could be more or less hard to patch a pirated Windows copy.
Once the company became aware of the WannaCry flaw, it was quick to release a patch back in March. "It knows how to exploit vulnerabilities in Windows XP, Windows Vista, Windows 7, Window Server 2008 and earlier versions", he added further.
Since increasing numbers of systems running older versions of Windows were affected, Microsoft had made a decision to push an emergency patch for Windows XP and Windows Server 2003, urging users to deploy the patch as soon as possible to limit the impact of WannaCry. This is exactly what happened within the NHS.
But after the highly public spread of WannaCry, companies around the globe no longer have an excuse to forgo system updates, said one former Obama administration official. So another massive cyberattack is most likely coming.
Window XP, Windows Vista users are particularly at risk because some of these users might not have licensed version of the software, or might not have updated their computer.
In fact, David Powner, director of IT at the Government Accountability Office, says some federal agencies pay programmers more to learn outdated languages, just to keep old systems functioning.
As the global ransomware attack continues, the Uttar Pradesh police, on May 16, issued a set of measures asking organisations to comply with them in order to protect themselves from the ongoing cyber attack.
Security experts believe WannaCry may have initially infected machines via email attachments.
WannaCry seems to have attacked computers in Russian Federation first, after which the ransomware quickly spread to as much as 150 + countries and affected Microsoft computers. And, if you were guessing that Windows 10 wouldn't catch this malware, you might be wrong.
And he just couldn't help reminding everyone that the NSA sucks.
Nonetheless, Bossert added that "we may still see a significant impact on additional networks as these malware attacks morph and change". Let's hope that now, after the severe consequences of the attack, employers will put the necessary efforts in advancing employees' knowledge about cyber security. Getting people to understand how is still a serious challenge.
WannaCry has largely been mitigated, but there are still hackers using the same exploit to infect computers - showing not everyone is able to fix their systems quickly.