WannaCry ransomware worm disrupts some businesses in Asia
While the effect of the WannaCry ransomware worm on Asian entities on Monday was less severe than anticipated, industry professionals flagged potential risks in the future
- France’s Engie appoints Rothschild to find a buyer for Indian solar biz
- Thyssenkrupp expects India elevator business revenue at ₹1,000 crore in 3 years
- Amazon India says during Prime Day main product categories saw strong sales growth
- Jana Small Finance Bank launches commercial operations
- Safeguard duty on imported modules will raise solar power tariffs up to ₹3 per unit: ratings agencies
Singapore/Washington: Asian governments and businesses reported some disruptions from the WannaCry ransomware worm on Monday but cybersecurity experts warned of a wider impact as more employees turned on their computers and checked e-mails.
In China, the world’s second-largest economy, payment systems and government services reported some outages from the ransomware attack, but far less than feared. Disruptions were low in the rest of Asia, including Japan, India, South Korea and Australia.
The WannaCry worm, which erupted on Friday, locked up hundreds of thousands of computers in more than 150 countries, hitting factories, hospitals, shops and schools worldwide.
While the effect on Asian entities on Monday was less severe than anticipated, industry professionals flagged potential risks in the future. Companies that were hit by the worm, which is spread mostly by email, may be wary of making it public, they added.
“We’re looking at (the) victims’ profiles, we’re still seeing a lot of victims in the Asia-Pacific region. But it is a global campaign, it’s not targeted,” said Tim Wellsmore, director of Threat Intelligence, Asia Pacific at cybersecurity firm FireEye Inc.
“But I don’t think we can say it hasn’t impacted this region to the extent it has some other regions.”
Michael Gazeley, managing director of Network Box, a Hong Kong-based cybersecurity firm, said there were still “many ‘landmines’ waiting in people’s in-boxes” in the region, with most of the attacks having arrived via e-mail.
However, financial markets in Asia were unfazed by news of the cyberattack, with stocks mostly up across the region during the day.
In China, energy giant PetroChina said payment systems at some of its petrol stations were hit, although it had been able to restore most of the systems. Several Chinese government bodies, including police and traffic authorities, reported they had been impacted by the hack, according to posts on official microblogs.
Chinese tech firm Qihoo 360 said the rate of infection on Monday had slowed significantly from the past two days.
“Previous concerns of a wide-scale infection of domestic institutions did not eventuate,” the firm said.
Japan’s National Police Agency reported two breaches of computers in the country on Sunday—one at a hospital and the other case involving a private person— but no loss of funds.
Industrial conglomerate Hitachi Ltd. said the attack had affected its systems at some point over the weekend, leaving them unable to receive and send e-mails or open attachments in some cases. The problem is still ongoing, the company said.
In India, the government said it had only received a few reports of attacks on systems and urged those hit not to pay attackers any ransom. No major Indian corporations reported disruptions to operations.
A spokesman for the Hong Kong Exchanges and Clearing, one of the region’s biggest bourses, said all systems were so far working normally. “We remain highly vigilant,” he said.
A cybersecurity researcher in Asia who declined to be named said that while most banks globally had escaped damage, not all had installed patches in time.
The result was that some phishing e-mails slipped through and were activated by users, but were caught by other security systems in place.
At Indonesia’s biggest cancer hospital, Dharmais Hospital in Jakarta, around 100-200 people packed waiting rooms after the institution was hit by cyber attacks affecting scores of computers. By late morning, some people were still filling out forms manually, but the hospital said 70% of systems were back online now.
Elsewhere in the region, companies warned users and staff not to click on attachments or links. One school in South Korea barred its pupils from using the internet. Taiwan’s government appeared to have escaped major infection, possibly because regulations there require all departments to install software updates as soon as they are available.
South Korea’s presidential Blue House office said nine cases of ransomware were found in the country, but did not provide details on where the cyber attacks were discovered.
In Australia, Dan Tehan, the government minister responsible for cybersecurity, said just three businesses had been hit by the bug, despite worries of widespread infection. There were no reported cases in New Zealand.
Cyber security experts said the spread of the ransomware had slowed since its appearance on Friday but that the respite might only be brief.
For one thing, the attackers or copycat attackers may have developed new versions of the worm, although a British-based security researcher who thwarted an earlier version of the worm told Reuters most of these reports had been proven false.
In Hong Kong, Gazeley said his team had found a new version of the worm that didn’t use e-mail to lure victims.
Instead, it loaded scripts onto hacked websites where users who clicked on a malicious link would be infected directly. He said it was too early to tell how many websites had been affected.
In a blog post on Sunday, Microsoft president Brad Smith appeared to tacitly acknowledge what researchers had already widely concluded: The ransomware attack leveraged a hacking tool built by the US National Security Agency that leaked online in April.
The non-profit US Cyber Consequences Unit research institute estimated that total losses would range in the hundreds of millions of dollars, but not exceed $1 billion.
Infected computers appear to largely be out-of-date devices that organizations deemed not worth the price of upgrading or, in some cases, machines involved in manufacturing or hospital functions that proved too difficult to patch without possibly disrupting crucial operations, security experts said.
Microsoft released patches last month and on Friday to fix a vulnerability that allowed the worm to spread across networks.
(Additional reporting by Jessica Yu in TAIPEI, Sam Nussey and Kaori Kaneko in TOKYO, Michelle Price in HONG KONG, Samuel Shen and David Stanway in SHANGHAI, Christine Kim in SEOUL, Engen Tham and Cate Cadell in BEIJING, Byron Smith in Sydney, Ed Davies and Agustinus Da Costa in JAKARTA, Euan Rocha in MUMBAI; Writing by Sam Holmes; Editing by Raju Gopalakrishnan)
Editor's Picks »
- France’s Engie appoints Rothschild to find a buyer for Indian solar biz
- Going into 2019, has brand Modi lost some of its sheen?
- Sun Pharma’s cancer injection from Halol plant gets USFDA nod
- A click moment for us was raising ₹100 crore in seed round to chase our dreams: Manish Lunia
- HDFC mutual fund arm to launch its ₹2,800 crore initial share sale next week
- Fund managers slashing allocations to equities in emerging markets, shows BAML survey
- ICICI Lombard tightens grip on profitability in a lean growth quarter
- TCNS Clothing IPO: Valuations capture the upsides adequately
- Nightmare of Indian Accounting Standard 115 comes to haunt firms in the real estate sector
- What is driving the optimism in stocks of paint companies?