Firms scramble to recover from wave of cyberattacks


Ransomware - which scrambles a computer's data until a payment is made - has grown explosively over the past couple of years, powered in part by the growing popularity of digital currencies such as Bitcoin. Banks, government offices, the postal service and Kiev's metro system were experiencing problems, officials said. The radiation monitoring system at Chernobyl was taken offline, forcing employees to use hand-held counters to measure levels at the former nuclear plant's exclusion zone.

Businesses in the Asia-Pacific region reported some disruptions on Wednesday with the operations of several European companies hit, including India's largest container port, although the impact on companies and governments across the wider region appeared to be limited.

APM Terminals, owned by Maersk, was experiencing system issues at multiple terminals, including the Port of NY and New Jersey, the largest port on the US East Coast, and Rotterdam in The Netherlands, Europe's largest harbour.

WannaCry was largely undone by the discovery of a "kill switch" that could shut it down.No such kill switch has been found so far with Petya, and experts are still working to find a way to stop it. However, who is responsible for the attack is still unknown.

Marco Cova, a researcher at the United States cybersecurity company Lastline, commented for The Times by saying that Petya looked "very similar in its dynamics and techniques" to Wannacry and appeared to rely on the same piece of software, called EternalBlue, to help it spreading.

Mattis says Syria's government taking US threat seriously
In response, president Donald Trump ordered the United States military to fire about 60 cruise missiles at the air base. Late on Monday, the White House warned that Assad would pay a "heavy price" for another attack.

Researchers are still figuring out exactly what happened.

A new ransomware attack similar to WannaCry has reached Asia after spreading from Europe to the U.S. overnight, hitting businesses, port operators and government systems.

It is not now known for certain how the infection is spreading, but some researchers have taken to Twitter to claim it is using the same technique as WannaCry to target the SMBv1 EternalBlue exploit and take advantage of unpatched Windows machines.

The supplier of the software, M.E.Doc denied in a post on Facebook that its software was to blame, though Microsoft reiterated its suspicions afterwards. But Kaspersky described it as a new form of ransomware.

How is this different from WannaCry?

North Korea vows to execute former South Korean president
Pyongyang also called on Seoul to hand over the ex-leader and other " traitors " for the sake of "future north-south relations". Kim Jong-un is known for executing or removing many senior officials that he had inherited from his father's regime.

Security specialists said the cyberattacks on Tuesday exploited an already patched vulnerability in Windows software and appeared to have focused on Ukraine as a primary target.

Unlike WannaCry, it locks down a computer's entire hard drive instead of just the files.

"It will still act as a platform to spread the ransomware to other machines on the same network".

The spread of this new ransomware is likely to be much slower than last month's WannaCry attack, researchers predict, as code analysis showed the new attack did not attempt to spread itself beyond the network it was placed on.

"It seems that the ones in charge of this campaign have learned quite a lot from the WannaCry campaign", said Itay Glick, the CEO of Israeli cybersecurity company Votiro.

Monaco's most creative Thomas Lemar 'the subject of Arsenal bid'
The former Caen man can is a wonderful crosser of the ball and this could be an incredibly risky weapon from a deep position. However, it would appear that Arsenal is pushing the hardest to secure the services of the 21-year-old playmaker.