A cyberattack similar to WannaCry entered its second day yesterday, hitting businesses, port operators and government systems across the globe, with companies struggling to retake control of their networks.
In Taiwan, the Executive Yuan’s Department of Cyber Security said that it has not received any reports of government computers being attacked by the ransomware that has ravaged mostly government and state enterprise computers in Europe and beyond.
AP Moller-Maersk A/S shut down systems across its operations to contain the cyberattack against its computer network, as it assesses the full impact.
BNP Paribas SA’s non-banking real estate unit was also hit, while a number of WPP PLC firms continue to be affected by the cyberattack, CEO Martin Sorrell and John Seifert, CEO of the ad giant’s Ogilvy & Mather unit, said in memo to staff.
Hamburg-based Beiersdorf AG, the maker of Nivea and Labello lip balm, said its central office and all worldwide sites were affected.
The cyberattack began in Ukraine on Tuesday, infecting computer networks and demanding US$300 in cryptocurrency to unlock their systems.
As of midday on Tuesday in North America, Kaspersky Lab analysts said about 2,000 users had been attacked, with organizations in Russia and Ukraine the most affected.
Kaspersky said its preliminary findings suggest that the latest attack involved a new malware, and is not a variant of Petya ransomware, as some reports indicated.
Kaspersky named it ExPetr, noting that “while it has several strings similar to Petya, it possesses entirely different functionality.”
The company said its telemetry data indicates about 2,000 attacked users so far. It added that organizations in Russia and Ukraine were the most affected, and hits were also registered in Poland, Italy, the UK, Germany, France, the US and several other countries.
The attacks had a limited impact in Asia. While there were early signs the virus was starting to spread in China, no large-scale outbreak was detected, Qihoo 360 Technology Co chief security engineer Zheng Wenbin said.
After the WannaCry outbreak earlier this year, ransomware is becoming a routine risk for businesses around the world. While banks and retailers have bolstered defenses against certain types of attacks, such as those targeting credit card data, many others are still catching up in building their defenses.
However, unlike traditional forms of ransomware, which often provide secure forms of payment in order to release control of networks, the new hack has seemingly concentrated on crippling systems, rather than obtaining a ransom. The e-mail address posted on users’ locked screens, used by victims to receive decryption keys, was easily and swiftly shut down by the e-mail provider.
“If it is a ransomware campaign to make money, it doesn’t add up,” said Raj Samani, chief scientist at McAfee, a cybersecurity company owned by Intel Corp.
He said there were many elements of the attack that made it look like the perpetrators did not actually care all that much about receiving payments.
Additional reporting by AP and CNA
‘A SERIOUS THREAT’: Japan has expressed grave concern over the Strait’s security over the years, which demonstrated Tokyo’s firm support for peace in the area, an official said China’s military drills around Taiwan are “incompatible” with peace and stability in the Taiwan Strait, Japanese Minister of Foreign Affairs Takeshi Iwaya said during a meeting with his Chinese counterpart Wang Yi (王毅) on Thursday. “Peace and stability across the Taiwan Strait is important for the international community, including Japan,” Iwaya told Wang during a meeting on the sidelines of the ASEAN-related Foreign Ministers’ Meetings in Kuala Lumpur. “China’s large-scale military drills around Taiwan are incompatible with this,” a statement released by the Japanese Ministry of Foreign Affairs on Thursday cited Iwaya as saying. The Foreign Ministers’ Meetings are a series of diplomatic
URBAN COMBAT: FIM-92 Stinger shoulder-fired missiles from the US made a rare public appearance during early-morning drills simulating an invasion of the Taipei MRT The ongoing Han Kuang military exercises entered their sixth day yesterday, simulating repelling enemy landings in Penghu County, setting up fortifications in Tainan, laying mines in waters in Kaohsiung and conducting urban combat drills in Taipei. At 5am in Penghu — part of the exercise’s first combat zone — participating units responded to a simulated rapid enemy landing on beaches, combining infantry as well as armored personnel. First Combat Zone Commander Chen Chun-yuan (陳俊源) led the combined armed troops utilizing a variety of weapons systems. Wang Keng-sheng (王鏗勝), the commander in charge of the Penghu Defense Command’s mechanized battalion, said he would give
‘REALISTIC’ APPROACH: The ministry said all the exercises were scenario-based and unscripted to better prepare personnel for real threats and unexpected developments The army’s 21st Artillery Command conducted a short-range air defense drill in Taoyuan yesterday as part of the Han Kuang exercises, using the indigenous Sky Sword II (陸射劍二) missile system for the first time in the exercises. The armed forces have been conducting a series of live-fire and defense drills across multiple regions, simulating responses to a full-scale assault by Chinese forces, the Ministry of National Defense said. The Sky Sword II missile system was rapidly deployed and combat-ready within 15 minutes to defend Taiwan Taoyuan International Airport in a simulated attack, the ministry said. A three-person crew completed setup and
DRILLS FOR 10 DAYS: The exercises would continue around the clock under realistic conditions taking into account all possibilities, the defense ministry said Taiwan yesterday launched its largest-ever military drills intended to guard against Chinese threats to invade, including using “gray zone” tactics deployed by China that stop just short of open warfare. This year’s 10-day live-fire Han Kuang exercises are the longest yet and follow the delivery of a range of new weaponry from tanks to uncrewed waterborne drones. The drills began with exercises to counter the actions of China Coast Guard and maritime militia ships that have been harassing Taiwanese vessels around outlying islands close to the Chinese coast, the Ministry of National Defense said. Cyberattacks and misinformation campaigns are seen by Taiwan as