Hackers behind the global WannaCry ransomware attack, that has hit 150 countries since Friday, have earned about ₹55 lakh so far.
The attack, which leveraged malicious software that security researchers widely believe was stolen from the U.S. National Security Agency, is the latest example of why the stockpiling of vulnerabilities by governments is such a problem, Microsoft President and Chief Legal Officer Brad Smith said in a blog post. While a United Kingdom security researcher managed to stop the spread of the virus, hackers have issued new versions that cybersecurity organizations are trying to counter and stamp out.
Many workers, particularly in Asia, had logged off on Friday when the malicious software, stolen from the U.S. government, began proliferating across computer systems around the world. They were installing software to fix the problems.
He added: "Although we have never seen anything on this scale when it comes to ransomware attacks, they are relatively common and there are things that you can do, that everyone can do, all of us can do, to protect ourselves against them".
NHS England said that, as of 3pm on Monday, two hospitals remained on divert following the attack, down from seven on Sunday.
Japanese companies said Monday they were working to overcome the problems caused by cyberattack.
"In particular, making sure that our data is properly backed up and making sure that we are using the software patches, the anti-virus patches, that are sent out regularly by manufacturers". The company said the virus has been localized and "technical work is underway to destroy it and update the antivirus protection". He said the situation was under control. The British Home Secretary said most of the NHS systems were back to normal by midday Saturday.
But the larger questions surrounding cyber security persist.
Broadcaster NTV said 600 companies and 2,000 computers in Japan had been affected.
When it was found, Microsoft was forced to act swiftly in order to patch the vulnerability. "At this stage, we do not have any evidence that patient data has been accessed".
While measures have been taken to slow the spread of the malware, new variations have begun to come about. a 22-year-old cybersecurity expert known as MalwareTech slowed the attack by registering a domain name he discovered in the ransomware's code.
The Lister Hospital is diverting t rauma to Addenbrooke's Hospital, part of Cambridgeshire University Hospitals, s troke to Luton and Dunstable Hospital NHS Foundation Trust, and c oronary care to Papworth Hospital.