Advertisement

Global cyberattack: where did it come from and is it under control?

Click to play video: 'What was behind Tuesday’s global cyberattack?'
What was behind Tuesday’s global cyberattack?
The mystery remains Wednesday on who is behind a crippling cyber-attack that spread from Europe to the United States. Hena Daniels has the latest on the ransomwear attack that locked computers around the world – Jun 28, 2017

The data-scrambling software epidemic that paralyzed computers globally is under control in Ukraine, where it likely originated, officials said Wednesday, as companies and governments around the world counted the cost of a crisis that is disrupting ports, hospitals and factories.

In a statement published Wednesday, the Ukrainian Cabinet said that “all strategic assets, including those involved in protecting state security, are working normally.”

The same couldn’t be said for India’s largest container port, where one of the terminals was idled by the malicious software, which goes by a variety of names including ExPetr.

M.K. Sirkar, a manager at the Jawaharlal Nehru Port Trust in Mumbai, said that no containers could be loaded or unloaded at the terminal operated by shipper A.P. Moller-Maersk on Wednesday.

Story continues below advertisement

In a statement, Moller-Maersk acknowledged that its APM Terminals had been “impacted in a number of ports” and that an undisclosed number of systems were shut down “to contain the issue.” The company declined to provide further detail or make an official available for an interview.

WATCH: Latest ransomware attack hits computers worldwide

Click to play video: 'Latest ransomware attack hits computers worldwide'
Latest ransomware attack hits computers worldwide

At the very least, thousands of computers worldwide have been struck by the malware, according to preliminary accounts published by cybersecurity firms, although most of the damage remains hidden away in corporate offices. Some names have trickled into the public domain as the disruption becomes obvious.

Financial news and insights delivered to your email every Saturday.

In Pennsylvania, lab and diagnostic services were closed at the satellite offices of Pennsylvania’s Heritage Valley Health System, for example. In Tasmania, an Australian official said a Cadbury chocolate factory had stopped production after computers there crashed.

Story continues below advertisement

WATCH: NATO Secretary-General considers cyber warfare to be another plane of war

Click to play video: 'NATO chief responds to global ransomware attack'
NATO chief responds to global ransomware attack

Other organizations affected include U.S. drugmaker Merck, food and drinks company Mondelez International, global law firm DLA Piper, London-based advertising group WPP.

As IT security workers turned their eye toward cleaning up the mess, others wondered at the attackers’ motives. Ransomware — which scrambles a computer’s data until a payment is made — has grown explosively over the past couple of years, powered in part by the growing popularity of digital currencies such as Bitcoin. But some believed that this latest ransomware outbreak was less aimed at gathering money than at sending a message to Ukraine and its allies.

WATCH: How to protect yourself from ransomware attacks

Click to play video: 'How to protect yourself from ransomware attacks'
How to protect yourself from ransomware attacks

That hunch was buttressed by the way the malware appears to have been seeded using a rogue update to a piece of Ukrainian accounting software and the timing — coming the same day as the assassination of a senior Ukrainian military intelligence officer in the nation’s capital and a day before a national holiday celebrating a new constitution signed after the breakup of the Soviet Union.

Story continues below advertisement

Suspicions were further heightened by the re-emergence of the mysterious Shadow Brokers group of hackers, whose dramatic leak of powerful NSA tools helped power Tuesday’s outbreak, as it did a previous ransomware explosion last month that was dubbed “WannaCry.”

In a post published Wednesday, The Shadow Brokers made new threats, announced a new money-making scheme and made references to what happened Tuesday.

“Another global cyber attack is fitting end for first month of theshadowbrokers dump service,” the group said, referring to a subscription service which purportedly offers hackers early access to even more of the NSA’s digital break-in tools.

“There is much theshadowbrokers can be saying about this but what is point and having not already being said?”

Few take Shadow Brokers’ threats or their ostentatious demands for cash at face value, but the timing of their re-emergence dropped another hint at the spy games possibly playing out behind the scenes.

Sponsored content

AdChoices