The ransomware has affected at least 200,000 computers worldwide since Friday. It may not be striking the U.S.as hard as elsewhere, but it does raise some issues even farmers should care about.
Microsoft pointed that, "The governments of the world should treat this attack as a wake-up call". "This is an emerging pattern in 2017".
"We have seen vulnerabilities stored by the Central Intelligence Agency show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world", wrote Smith.
A ransomware attack called WannaCry that was first launched on 12 May and since spread around the world impacted a number of high-profile organisations globally, including NHS England in the UK. The hacking tool spreads silently between computers, shutting them down by encrypting data and then demanding a ransom of $300 to unlock them.
Tom Bossert, a homeland security adviser to President Trump, said Monday on television that things are "right now, under control" in the United States.
"There is this stream of liability that flows from the ransomware attack", he said. But he disagreed about where the blame lies.
Analogy time: Let's say there's an architect who designs castles. (MSFT) issued a security patch in March that resolved the problem for machines running Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8.1, Windows Server 2012, Windows 10, Windows Server 2012 R2 and Windows Server 2016.
Avivah Litan, a cybersecurity analyst at Gartner, agreed that the government is "is negligent not doing a better job protecting companies", but added that it's not like "you can stop the US government from developing cybertools" that then work as intended.
Fresh reports of attack have also started getting lodged from other parts of the country.
"Whether or not you think the USA government should be spending a fortune developing such cyber-weapons, surely it is obvious that the weapons they develop should be properly secured", said Phillip Hallam-Baker, principal scientist for New Jersey-based cybersecurity firm Comodo, in an emailed statement. You should have these stored in more than one place.
"While it would be satisfying to hold accountable those responsible for this hack - something that we are working on quite seriously - the worm is in the wild, so to speak, at this point, and patching is the most important message as a result", said Bossert. Unfortunately, the only source for identifying the attack seems to be a single source - so, in other words, beware what you hear about it.