custom ad
NewsJune 28, 2017

PARIS -- A new and highly virulent outbreak of data-scrambling software caused disruption across the world Tuesday. Following a similar attack in May, the fresh assault paralyzed some hospitals, government offices and major multinational corporations in a dramatic demonstration of how easily malicious programs can bring daily life to a halt...

By RAPHAEL SATTER and FRANK BAJAK ~ Associated Press
Customers queue at a grocery shop Tuesday in Kiev, Ukraine. A new and highly virulent outbreak of malicious data-scrambling software appears to be causing mass disruption across Europe, hitting Ukraine especially hard, with company and government officials reporting serious intrusions at the Ukrainian power grid, banks and government offices.
Customers queue at a grocery shop Tuesday in Kiev, Ukraine. A new and highly virulent outbreak of malicious data-scrambling software appears to be causing mass disruption across Europe, hitting Ukraine especially hard, with company and government officials reporting serious intrusions at the Ukrainian power grid, banks and government offices.Sergei Chuzavkov ~ Associated Press

PARIS -- A new and highly virulent outbreak of data-scrambling software caused disruption across the world Tuesday. Following a similar attack in May, the fresh assault paralyzed some hospitals, government offices and major multinational corporations in a dramatic demonstration of how easily malicious programs can bring daily life to a halt.

Ukraine and other parts of Europe were hit particularly hard by the new strain of ransomware -- malicious software that locks up computer files with all-but-unbreakable encryption and then demands a ransom for its release. As the malware began to spread across the United States, it affected companies such as the drugmaker Merck and Mondelez International, the owner of food brands such as Oreo and Nabisco. But its pace appeared to slow as the day wore on.

The origins of the malware remain unclear. Researchers picking the program apart found evidence its creators had borrowed from leaked National Security Agency code, raising the possibility the digital havoc had spread using U.S. taxpayer-funded tools.

"The virus is spreading all over Europe, and I'm afraid it can harm the whole world," said Victor Zhora, the chief executive of Infosafe IT in Kiev, Ukraine, where reports of the malicious software first emerged earlier Tuesday.

In Ukraine, victims included top-level government offices, where officials posted photos of darkened computer screens; energy companies; banks; and even cash machines, gas stations and supermarkets. Multinational companies, including the global law firm DLA Piper and Danish shipping giant A.P. Moller-Maersk also were affected, although the firms didn't specify the extent of the damage.

A computer screen cyberattack warning notice reportedly holding computer files to ransom, as part of a massive international cyberattack, at an office Tuesday in Kiev, Ukraine. This image, used with permission of the account holder facebook.com/olejmaa, was checked and is consistent with independent AP reporting.
A computer screen cyberattack warning notice reportedly holding computer files to ransom, as part of a massive international cyberattack, at an office Tuesday in Kiev, Ukraine. This image, used with permission of the account holder facebook.com/olejmaa, was checked and is consistent with independent AP reporting.Oleg Reshetnyak via AP

In the U.S., a hospital in western Pennsylvania said it was dealing with a "widespread" cyberattack, but didn't immediately release further details.

Security experts said Tuesday's global cyberattack shares something in common with last month's outbreak of ransomware, dubbed WannaCry: Both spread using digital lock picks originally created by the NSA and later published to the web by a still-mysterious group known as the Shadowbrokers.

Security vendors including Bitdefender and Kaspersky said the NSA exploit, known as EternalBlue, is allowing malware to spread rapidly by itself across internal computer networks at companies and other large organizations.

Receive Daily Headlines FREESign up today!

Microsoft issued a security fix in March, but Chris Wysopal, chief technology officer at the security firm Veracode, warned that would only be effective if 100 percent of computers on a company's network were patched, saying if one computer were infected, the malware could use a backup mechanism to spread to patched computers as well.

Bogdan Botezatu, an analyst with Bitdefender, compared such self-spreading software, often called "worms," to a contagious disease.

Airport employees use a laptop computer at Boryspil airport Tuesday in Kiev, Ukraine.
Airport employees use a laptop computer at Boryspil airport Tuesday in Kiev, Ukraine.Sergei Chuzavkov ~ Associated Press

"It's like somebody sneezing into a train full of people," Botezatu said. "You just have to exist there and you're vulnerable."

Aside from its method of propagation, the malware was different from WannaCry. Botezatu said the new program appeared to be nearly identical to GoldenEye, itself a variant of a known family of hostage-taking programs known as "Petya."

The motives of those behind the malware remain unknown. Emails sent to an address posted to the bottom of ransom demands went unreturned. That might be because the email provider hosting that address, Berlin-based Posteo, pulled the plug on the account before the infection became widely known.

In an email, a Posteo representative said it had blocked the email address "immediately" after learning it was associated with ransomware. The company added it was in contact with German authorities "to make sure that we react properly."

The blocked address may make it difficult for hackers to capitalize on the digital havoc, but it also may complicate victims' attempts to retrieve their data. Without the hackers' decryption key -- or the discovery of some weakness in the malware's code -- the encrypted data may stay scrambled for a long time yet.

Bajak reported from Dallas. Associated Press writers Anick Jesdanun in New York, Vladimir Isachenkov in Moscow, Larry Rosenthal in Beaver, Pennsylvania, and Jan M. Olsen in Copenhagen, Denmark, contributed to this report.

Advertisement

Connect with the Southeast Missourian Newsroom:

For corrections to this story or other insights for the editor, click here. To submit a letter to the editor, click here. To learn about the Southeast Missourian’s AI Policy, click here.

Advertisement
Receive Daily Headlines FREESign up today!