波多野结衣办公室双飞_制服 丝袜 综合 日韩 欧美_网站永久看片免费_欧美一级片在线免费观看_免费视频91蜜桃_精产国品一区二区三区_97超碰免费在线观看_欧美做受喷浆在线观看_国产熟妇搡bbbb搡bbbb_麻豆精品国产传媒

USEUROPEAFRICAASIA 中文雙語(yǔ)Fran?ais
World
Home / World / Americas

Log in, look out: cyberattack havoc could grow at week's start

chinadaily.com.cn | Updated: 2017-05-15 10:32

Log in, look out: cyberattack havoc could grow at week's start

A projection of cyber code on a hooded man is pictured in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the US National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. [Photo/Agencies]

LONDON?- An unprecedented "ransomware" cyberattack that has already hit tens of thousands of victims in 150 countries could wreak greater havoc as more malicious variations appear and people return to their desks Monday and power up computers at the start of the workweek.

Officials and experts on Sunday urged organizations and companies to update their operating systems immediately to ensure they aren't vulnerable to a second, more powerful version of the software — or to future versions that can't be stopped.

The cyberattack paralyzed computers that run Britain's hospital network, Germany's national railway and scores of other companies and government agencies worldwide.

Chinese media reported Sunday that students at several universities were hit, blocking access to their thesis papers and dissertation presentations.

The attack, already believed to be the biggest online extortion scheme ever recorded, is an "escalating threat" after hitting 200,000 victims across the world since Friday, according to Rob Wainwright, the head of Europol, Europe's policing agency.

"The numbers are still going up," Wainwright said. "We've seen that the slowdown of the infection rate over Friday night, after a temporary fix around it, has now been overcome by a second variation the criminals have released."

Researchers discovered at least two variants of the rapidly replicating worm Sunday and one did not include the so-called kill switch that allowed them to interrupt its spread Friday by diverting it to a dead end on the internet.

Ryan Kalember, senior vice-president at Proofpoint Inc, said the version with no kill switch was able to spread but it contained a flaw that wouldn't allow it to take over a computer and demand ransom to unlock files. However, he said it's only a matter of time before such a version exists.

"I still expect another to pop up and be fully operational," Kalember said. "We haven't fully dodged this bullet at all until we're patched against the vulnerability itself."

The attack held users hostage by freezing their computers, encrypting their data and demanding money through online bitcoin payment — $300 at first, rising to $600 before it destroys files hours later.

The 200,000 victims included more than 100,000 organizations, Europol spokesman Jan Op Gen Oorth told The Associated Press.

He said it was too early to say who was behind the onslaught and what their motivation was, aside from the obvious demand for money. So far, he said, not many people have paid the ransom demanded by the malware.

The effects were felt across the globe, with Britain's National Health Service, Russia's Interior Ministry and companies including Spain's Telefonica, FedEx Corp in the US and French carmaker Renault all reporting disruptions.

Had it not been for a young British cybersecurity researcher's accidental discovery of a so-called "kill switch," the malicious software likely would have spread much farther and faster.

The 22-year-old researcher known as "MalwareTech," who wanted to remain anonymous, said he spotted a hidden web address in the "WannaCry" code and made it official by registering its domain name. That move, which cost just $10.69, redirected the attacks to the server of Kryptos Logic, the security company where he works. The server operates as a "sinkhole" to collect information about malware — and in Friday's case kept the malware from escaping.

Security officials urged organizations to protect themselves by installing security fixes right away, running antivirus software and backing up data elsewhere.

"Just patch their systems as soon as possible," MalwareTech said. "It won't be too late as long as they're not infected. It should just be a case of making sure installing updates is enabled, installing the updates, and reboot."

The ransomware appeared to exploit a vulnerability in Microsoft Windows that was purportedly identified by the US National Security Agency for its own intelligence-gathering purposes. The NSA tools were stolen by hackers and dumped on the internet.

Experts say this vulnerability has been understood among experts for months, yet too many groups failed to take it seriously. Microsoft had "patched," or fixed it, in updates of recent versions of Windows since March, but many users did not apply the software fix.

Worse, the malware was able to create so much chaos because it was designed to self-replicate like a virus, spreading quickly once inside university, business and government networks.

Microsoft was quick to change its policy, announcing free security patches to fix this vulnerability in the older Windows systems still used by millions of individuals and smaller businesses. Before Friday's attack, Microsoft had made fixes for older systems, such as 2001's Windows XP, available only to those who paid extra for extended technical support.

"The problem is the larger organizations are still running on old, no longer supported operating systems," said Lawrence Abrams, a New York-based blogger who runs BleepingComputer.com. "So they no longer get the security updates they should be."

Short of paying, options for those already infected are usually limited to recovering data files from a backup, if available, or living without them.

British cybersecurity expert Graham Cluley doesn't want to blame the NSA for the attack, though he said they have a duty to citizens who "are living an online life."

"Obviously, they want those tools in order to spy on people of interest, on other countries, to conduct surveillance," Cluley said. "It's a handy thing to have, but it's a dangerous thing to have, because they can be used against you. And that's what's happening right now."

AP

Most Viewed in 24 Hours
Copyright 1995 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
License for publishing multimedia online 0108263

Registration Number: 130349
FOLLOW US
波多野结衣办公室双飞_制服 丝袜 综合 日韩 欧美_网站永久看片免费_欧美一级片在线免费观看_免费视频91蜜桃_精产国品一区二区三区_97超碰免费在线观看_欧美做受喷浆在线观看_国产熟妇搡bbbb搡bbbb_麻豆精品国产传媒
亚洲精品菠萝久久久久久久| 亚洲成人激情小说| 天天躁日日躁aaaa视频| 欧美精品1区2区3区| 亚洲一区二区三区四区不卡| 99re热视频精品| 91官网在线观看| 亚洲免费伊人电影| 91香蕉视频污| 在线国产亚洲欧美| 一区二区视频在线| 野花视频免费在线观看| 欧美日韩一区二区电影| 亚洲国产精品一区二区久久| 久久久无码人妻精品无码| 欧美乱熟臀69xxxxxx| 午夜精品在线看| 久久久久久久久免费看无码| 欧美大片在线观看| 国产一区二区三区黄视频 | 99视频精品在线| 一本色道a无线码一区v| 亚洲精品成人a在线观看| 精品无码av一区二区三区不卡| 欧美日韩一级黄| 午夜精品福利一区二区蜜股av| 中出视频在线观看| 精品成人佐山爱一区二区| 国产一区二区三区电影在线观看| 国产免费嫩草影院| 日韩美女视频一区| 精品人妻在线视频| 精品国产一区二区三区四区四| 韩国视频一区二区| 欧美黄色aaa| 亚洲一级在线观看| 国产激情第一页| 男人的天堂免费| 欧美日韩综合一区| 免费观看在线综合色| 欧美视频一区二区在线| 亚洲美女视频一区| 天天插天天射天天干| 国产三级精品视频| 91麻豆精品在线观看| 欧美一区二区三区在线观看视频| 久久99国产精品久久99| 久草综合在线视频| 日欧美一区二区| av资源在线免费观看| 一级做a爱片久久| 亚洲a v网站| 亚洲区小说区图片区qvod| 日本五十肥熟交尾| 国产欧美精品在线观看| xxxx国产视频| 久久精品一区八戒影视| 91丨九色丨国产丨porny| 欧美电影免费观看高清完整版在线 | 国产伦精品一区二区三区免费迷| 色综合天天综合| 免费观看30秒视频久久| h色网站在线观看| 日日骚欧美日韩| 老湿机69福利| 日本人妖一区二区| 色综合天天在线| 久久国产精品色| 欧美性色aⅴ视频一区日韩精品| 美女国产一区二区三区| 在线视频国内自拍亚洲视频| 久久er99热精品一区二区| 日本高清免费不卡视频| 久久国产综合精品| 欧美三级韩国三级日本一级| 国产露脸91国语对白| 69久久夜色精品国产69蝌蚪网| 精品入口麻豆88视频| 国产91丝袜在线播放九色| 日韩视频中午一区| 91麻豆国产精品久久| 国产欧美综合在线| 精品人妻一区二区三区视频| 亚洲乱码国产乱码精品精的特点| 日本美女xxx| 视频一区国产视频| 色婷婷久久久亚洲一区二区三区| 久久99蜜桃精品| 欧美丰满一区二区免费视频| 成人综合婷婷国产精品久久蜜臀| 欧美成人r级一区二区三区| 宇都宫紫苑在线播放| 日本一区免费视频| 精品人妻无码一区二区三区换脸| 亚洲在线一区二区三区| 国产免费美女视频| 加勒比av一区二区| 91麻豆精品久久久久蜜臀| 99re成人精品视频| 中文字幕中文字幕一区二区| 五月婷婷婷婷婷| 美洲天堂一区二卡三卡四卡视频| 欧美老肥妇做.爰bbww视频| av动漫一区二区| 欧美国产乱子伦| 无码少妇精品一区二区免费动态| 视频在线观看国产精品| 欧美三级在线播放| 黄色片子免费看| 亚洲欧美日韩人成在线播放| 日本黄色片免费观看| 国产一区二区电影| 久久综合九色综合97_久久久| 在线观看国产网站| 日韩激情av在线| 91精品在线观看入口| 国产麻豆剧传媒精品国产| 亚洲女人的天堂| 在线观看国产日韩| 日本55丰满熟妇厨房伦| 亚洲另类一区二区| 在线观看亚洲精品| 91浏览器入口在线观看| 亚洲精选一二三| 在线免费视频一区二区| 91麻豆精品视频| 亚洲一区在线看| 欧美日韩国产免费| 国产麻豆剧传媒精品国产av| 天天色 色综合| 日韩手机在线导航| 精品少妇人妻一区二区黑料社区| 日本不卡在线视频| 亚洲精品一区二区三区香蕉 | 男人添女人荫蒂国产| 一级特黄大欧美久久久| 欧美人妇做爰xxxⅹ性高电影| 亚洲精品鲁一鲁一区二区三区 | 精品国产亚洲在线| 日本高清黄色片| 国产成人精品影视| 亚洲欧洲av色图| 在线日韩国产精品| 91传媒理伦片在线观看| 日本va欧美va瓶| www亚洲一区| 亚洲二区在线播放| 99re这里只有精品首页| 亚洲成人一区在线| 日韩欧美aaaaaa| 国产农村妇女精品一区| 成人高清免费在线播放| 日韩欧美一二三区| 亚洲精品视频网址| 成人v精品蜜桃久久一区| 一区二区久久久| 日韩精品一区在线| 天天爽天天爽天天爽| 91原创在线视频| 日本成人在线网站| 国产视频在线观看一区二区三区| 乱h高h女3p含苞待放| 97中文字幕在线观看| 美洲天堂一区二卡三卡四卡视频| 国产欧美日韩在线| 欧美伊人久久大香线蕉综合69| 在线天堂www在线国语对白| 精品在线播放免费| 亚洲丝袜精品丝袜在线| 91精品国产高清一区二区三区蜜臀 | 成人免费黄色小视频| 涩视频在线观看| 国内精品自线一区二区三区视频| 日韩一区欧美一区| 欧美一二三区精品| 91人妻一区二区三区蜜臀| 动漫美女无遮挡免费| 国产在线精品一区在线观看麻豆| 亚洲婷婷国产精品电影人久久| 成人sese在线| 日本一区中文字幕| 国产精品麻豆网站| 91精品啪在线观看国产60岁| 污污视频网站在线免费观看| 男人添女人荫蒂国产| 国产高清精品在线| 视频一区欧美精品| 亚洲欧美一区二区在线观看| 欧美一级免费观看| 色综合久久综合网97色综合| 久久丫精品国产亚洲av不卡| 成人激情校园春色| 免费不卡在线观看| 悠悠色在线精品| 2023国产精品自拍| 欧美猛男男办公室激情| 一区二区三区影视| 亚洲自拍偷拍一区二区 | 欧美极品美女视频| 日韩一区二区视频|