Ransomware attack: India largely safe

For the attack, hackers have used a flaw in Microsoft software to infiltrate unguarded systems.

May 13, 2017 09:31 pm | Updated December 03, 2021 05:14 pm IST

This November 3, 2016 photo taken in the French city of Rennes shows a viruses list on a screen at the country’s National Institute for Research in Computer Science and Automation (INRIA).

This November 3, 2016 photo taken in the French city of Rennes shows a viruses list on a screen at the country’s National Institute for Research in Computer Science and Automation (INRIA).

While no major incident of the worldwide ransomware attack has been reported from India so far, Gulshan Rai, the Cyber Security Chief in the PMO, said a better impact assessment would be possible only on Monday when offices open.

The Indian Computer Emergency Response Team (CERT-In), which on Saturday issued an advisory asking organisations to install updates to Windows systems, had in fact released a vulnerability note with a “Severity Rating of High” on March 15 for “a possible remote exploitation of this vulnerability.” The agency advised that the patch released by Microsoft be applied. Over 70 countries have been hit by the cyber attack.

“We have been checking hundreds of systems since we were alerted to this cyber attack. The attacks seem to be the result of a vulnerability in the Microsoft windows OS , and we released a patch,” Mr Rai told The Hindu . “We understand systems in Andhra Pradesh are impacted, but so far our assessment is that there isn't much impact,” he added.

CERT-In alert on ransomware attack

Referring to the malware that entered the police cyber networks in Andhra Pradesh, Mr Rai said, “Since this has happened here on the weekend, we are expecting a better impact assessment on Monday.”

 

For the attack, which is “perhaps the largest, most widespread and contiguous malware attack in history”, hackers have used a flaw in Microsoft software to infiltrate unguarded systems. “Microsoft had released a patch against this flaw in March but many system administrators failed to patch all computers and the ones which were unpatched became vulnerable to this attack,” Pradipto Chakrabarty, Regional Director, CompTIA India told The Hindu .

CompTIA is a global not for profit IT Industry trade body.

CERT-In explained that this ransomware called WannaCrypt or WannaCry encrypts the computer’s hard disk drive and then spreads laterally between computers on the same local area network. The ransomware also spreads through malicious attachments in emails.

Mr Chakrabarty added that the police system in Andhra Pradesh was impacted which may be “because they were using an older version of Microsoft operating system and poor patch maintenance”.

 

Cyber security solution provider Symantec said large number of organizations, particularly in Europe, were impacted. On the other hand Russia-based cyber security firm Kaspersky said it has recorded more than 45,000 attacks of the WannaCry ransomware in 74 countries around the world, mostly in Russia. According to Kaspersky, of these about 5% attacks were in India.

Kaspersky also added that their visibility “may be limited and incomplete and the range of targets and victims is likely much, much higher”.

Tarun Kaura, Director, Product Management – Asia Pacific Japan for Symantec said, “WannaCry has the ability to spread itself within corporate networks, without user interaction, by exploiting a known vulnerability in Microsoft Windows. Computers which do not have the latest Windows security updates applied are at risk of infection.”

Once the ransomware encrypts data files on the affected computer, it asks users to pay the ransom in bitcoins. While the initial payment demanded is of $300, the ransom note indicates that the payment amount will be doubled after three days. If payment is not made after seven days, the encrypted files will be deleted.

Usually the ransom demand is in the form of crypto currencies such as Bitcoin whose transaction trail is virtually untraceable, Mr Chakrabarty said.

CERT-In, in its advisory issued on Saturday, said that to prevent this infection, users and organisations are advised to apply patches to “Windows systems as mentioned in Microsoft Security Bulletin MS19-010.”

Saket Modi, CEO & Co-Founder of cyber security firm Lucideus said individuals too can be targeted using WannaCry, but since “it’s a ransom worm which means that it automatically hops to another computer in the same network... by targeting an organisation the attack surface for a cyber criminal increases.”

(With inputs from Suhasini Haidar)

0 / 0
Sign in to unlock member-only benefits!
  • Access 10 free stories every month
  • Save stories to read later
  • Access to comment on every story
  • Sign-up/manage your newsletter subscriptions with a single click
  • Get notified by email for early access to discounts & offers on our products
Sign in

Comments

Comments have to be in English, and in full sentences. They cannot be abusive or personal. Please abide by our community guidelines for posting your comments.

We have migrated to a new commenting platform. If you are already a registered user of The Hindu and logged in, you may continue to engage with our articles. If you do not have an account please register and login to post comments. Users can access their older comments by logging into their accounts on Vuukle.