Another Ransomware Global Attack Disrupted Governmental and Ginancial Organizations

A large scale global Cyber Attack was detected Tuesday across the eastern Europe which has the similar tactics of last month ransomware virus ‘Wannacry’ that infected 300,000 computers.
Russian and Ukrainian bank, company, multinational firms are infected badly. UK, Germany and few others European countries also reported to get hacked on Tuesday attack.


The growing ransomware and black hat attacks are showing their capability on taking down computers no matter governmental or company’s. The ultimate reason to the attack is to gain money, ransomware attack that freezes computer asks victim to pay 300$ through Bitcoin. Some case the demand is too high for company with higher value.


The attacking virus contains a code which Cyber experts believe that was stolen from NSA known as ‘Eternal Blue’. Last month massive ransomware attack ‘Wannacry’ also included that.
“Cyber attacks can simply destroy us,” said Kevin Johnson, chief executive of cyber security firm Secure Ideas. “Companies are just not doing what they are supposed to do to fix the problem.


The ransomware attacks computers running with unpatched Microsoft OS. Microsoft released a patch in March but only a few updated their PC. As a result ‘Wannacry’ hits that much damage. Since the ‘Wannacry’ attack, people tend to update their OS frequently.


“We are continuing to investigate and will take appropriate action to protect customers,” a spokesman for the company said, adding that Microsoft antivirus software detects and removes it.
Attacks were recorded in different fields. Russia’s Rosneft, an oil company and part of central bank  was infected in the attack. Ukrainian govt. computers shut down. WPP, one of the largest advertising company, French construction materials firm Saint Gobain , U.S. drugmaker Merck & Co,  Mars Inc’s Royal Canin pet food business, Beiersdorf, makers of Nivea skin care products, and Reckitt Benckiser were the most infected victims of the attack.

Leave a Reply

Your email address will not be published. Required fields are marked *