男友太凶猛1v1高h,大地资源在线资源免费观看 ,人妻少妇精品视频二区,极度sm残忍bdsm变态

USEUROPEAFRICAASIA 中文雙語Fran?ais
Business
Home / Business / Technology

Ransom virus slowing, cyber security awareness promoted

By Zhu Lingqing | chinadaily.com.cn | Updated: 2017-05-16 16:43

Ransom virus slowing, cyber security awareness promoted

The ransomware virus, dubbed WannaCry, can encrypt all the files on a Windows PC and demands $300 worth of bitcoin, an untraceable digital currency widely used online, to unlock a user's data. [Photo/VCG]

Cyber security emergency response appears to have prevented a fresh round of attack from a ransomware virus that has hit more than 300,000 computers across the world.

The cyber security industry were fearful of a 'black Monday', as many workers switched on their computers after the weekend.

"A large-scale infection has been avoided, thanks to a 72-hour national mobilization and emergency response led by the authorities and supported by the industry," leading domestic cyber security company 360 Business Security Group said.

The ransomware virus, dubbed WannaCry, can encrypt all the files on a Windows PC and demands $300 worth of bitcoin, an untraceable digital currency widely used online, to unlock a user's data.

A Cybercpace Administration of China official said on Monday, that although the virus is still spreading, it has slowed.

"After the virus breakout, the authorities immediately made arrangements for cyber security guards and domestic cyber security companies to proactively provide security services and preventive tools," the official said.

Wu Yunkun, president of 360 Business Security Group, told chinadaily.com.cn to curb the virus's spread, the company had provided eight versions of warning notices, seven repair guides and six repair tools to their government and enterprises customers as of Monday morning.

The ransomware cyber attack, which is believed to be the largest global cyber attack in history, has hit 300,000 victims in at least 150 countries since Friday, making $70,000 worth of bitcoin, White House official Tom Bossert said, China News Service reported.

The report said that in China, more than 29,000 IPs were infected by the virus from Friday to Saturday, most of which were universities, hospitals, transport systems and companies.

The National Computer Network Emergency Response Technical Team/Coordination Center of China (CNCERT/CC) had found 2.42 million IPs were suffering the attack and the number of infected IPs reached 35,000 as of 10:30 am on Sunday, Xinhua reported.

Jiangsu, Zhejiang, Guangdong and Jiangxi province were most affected, a report released by 360 Threat Intelligence Center on Saturday said.

"What is new about the WannaCry ransomware virus, which can worm its way into Windows PCs and propagate automatically through systems, is its attack on intranets," Wu said.

"The Transmission Control Protocol port 445 of Windows system, which is widely acknowledged unsafe, is closed on many computers. However, it is usually open on intranets used in many industries and enterprises because they think their intranets can be isolated with the extranet."

Wu said that is why universities, organizations and enterprises were especially vulnerable to the ransomware.

"Code for exploiting that bug, which is known as "Eternal Blue" in Microsoft's Windows operating system, was released on the internet in March and Microsoft released patches last month," Wu noted.

He said domestic cyber security companies like 360 Business Security Group reminded users to install patches via security software in March, but many users ignored the fix.

"The case is a test of the cyber security defending system in China. Although cyber security is considered to be at a national strategy level, domestic institutions and enterprises' overall security awareness is still not strong."

Brad Smith, president and chief legal officer of Microsoft, also said the cyber attack is "a wake-up call for all of us, whether we're in the tech sector, as customers or as government", according to a PBS report.

At present, the so-called "kill switch" for the attack, discovered by a young British cybersecurity researcher, is no longer effective.

As new versions of the virus such as WannaCry 2.0 have already begun emerging, any respite might be brief.

Most Viewed in 24 Hours
Copyright 1995 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
License for publishing multimedia online 0108263

Registration Number: 130349
FOLLOW US
主站蜘蛛池模板: 浦江县| 武鸣县| 怀仁县| 新蔡县| 九龙城区| 拉萨市| 彭泽县| 镇康县| 延安市| 苍溪县| 凤山县| 汝州市| 云南省| 布尔津县| 湘乡市| 铜山县| 营口市| 正阳县| 轮台县| 和龙市| 屏东市| 含山县| 和龙市| 宁海县| 玉龙| 南澳县| 河津市| 宾阳县| 南雄市| 绥德县| 瑞昌市| 江华| 牟定县| 儋州市| 全椒县| 黔西县| 中江县| 凌海市| 自治县| 礼泉县| 乐亭县|