Vaccine found against ‘Petya’ cyber attack

Last month’s WannaCry or WannaCrypt ransomware attack affected more than 230,000 computers in over 150 countries, with the UK’s national health service, Spanish phone giant Telefónica and German state railways among those hardest hit.The Singapore Computer Emergency Response Team (SingCert) has issued an alert to computer users to patch their Microsoft Windows computers, which are the targets of the latest ransomware dubbed Petya.However, less than 24 hours after the attack is known to have started, paying the ransom is no longer an option. To restore access, they further demanded USD300 in bitcoin payments.”Online records showed that 30 victims had paid the ransom”, says the New York Times.”Our initial analysis found that the ransomware uses multiple techniques to spread, including one which was addressed by a security update previously provided for all platforms from Windows XP to Windows 10 (MS17-010)”, a Microsoft spokesperson told AFP. A spokesman for the company said that ” They are continuing to investigate and take appropriate action to protect their customers”.The bedeviling onslaught Tuesday was also being referred to as ransomware by U.S. software titan Microsoft and security specialists.Experts suggest the malware was taking advantage of the same weaknesses used by the Wannacry attack last month. The deputy Prime Minister, Rozenko Pavlo, confirmed infection of all government computers.The statement also said that all “technological systems of the station operate in the normal mode”, but that “in connection with the cyberattack, the Chernobyl nuclear power plant website is not working”. “We can confirm the breakdown is caused by a cyber attack”, a spokeswoman said. The White House National Security Council, in a statement, said there was no risk to public safety now.”The company’s servers underwent a powerful hacking attack”, the company said on Twitter. The NSA however, did not comment any. Just as WannaCry did, this new attack makes use of the EternalBlue exploit that was developed by the National Security Agency and later stolen.”We believe Shadow Brokers is tied to the Russian government, and that the North Korean government was behind WannaCry”, said security experts.DLA employees received text messages that instructed them not to log in to their computers or turn them on, The ABC reported.