Major cyberattack sweeps globe, India affected, Jawaharlal Nehru Port in Mumbai hit

Agencies
June 28, 2017

New Delhi, Jun 28: A major global cyber attack on Tuesday disrupted computers at Russia's biggest oil company, Ukrainian banks and multinational firms with a virus similar to the ransomware that last month infected more than 300,000 computers.

cyberattack

India was also among the countries affected by the ransomware with the country's largest port Jawaharlal Nehru Port Trust in Mumbai shutting down operations at one of its three terminals.

News agency reported that operations at one of the three terminals of the country's largest container port were impacted as a fallout of the global ransomware attack, which crippled some central banks and many large corporations in Europe.

The rapidly spreading cyber extortion campaign underscored growing concerns that businesses have failed to secure their networks from increasingly aggressive hackers, who have shown they are capable of shutting down critical infrastructure and crippling corporate and government networks.

It included code known as "Eternal Blue," which cyber security experts widely believe was stolen from the US National Security Agency (NSA) and was also used in last month's ransomware attack, named "WannaCry."

"Cyber attacks can simply destroy us," said Kevin Johnson, chief executive of cyber security firm Secure Ideas. "Companies are just not doing what they are supposed to do to fix the problem."

The ransomware virus crippled computers running Microsoft Corp's Windows by encrypting hard drives and overwriting files, then demanded USD300 in bitcoin payments to restore access. More than 30 victims paid into the bitcoin account associated with the attack, according to a public ledger of transactions listed on blockchain.info.

Microsoft said the virus could spread through a flaw that was patched in a security update in March.

"We are continuing to investigate and will take appropriate action to protect customers," a spokesman for the company said, adding that Microsoft antivirus software detects and removes it.

RUSSIA AND UKRAINE MOST AFFECTED

Russia and Ukraine were most affected by the thousands of attacks, according to security software maker Kaspersky Lab, with other victims spread across countries including Britain, France, Germany, Italy, Poland and the United States. The total number of attacks was unknown.

Security experts said they expected the impact to be smaller than WannaCry since many computers had been patched with Windows updates in the wake of WannaCry last month to protect them against attacks using Eternal Blue code.

Still, the attack could be more dangerous than traditional strains of ransomware because it makes computers unresponsive and unable to reboot, Juniper Networks said in a blog post analyzing the attack.

Researchers said the attack may have borrowed malware code used in earlier ransomware campaigns known as "Petya" and "GoldenEye".

Following last month's attack, governments, security firms and industrial groups aggressively advised businesses and consumers to make sure all their computers were updated with Microsoft patches to defend against the threat.

The US Department of Homeland Security said it was monitoring the attacks and coordinating with other countries. It advised victims not to pay the extortion, saying that doing so does not guarantee access will be restored.

In a statement, the White House National Security Council said there was currently no risk to public safety. The United States was investigating the attack and determined to hold those responsible accountable, it said.

The NSA did not respond to a request for comment. The spy agency has not publicly said whether it built Eternal Blue and other hacking tools leaked online by an entity known as Shadow Brokers.

Several private security experts have said they believe Shadow Brokers is tied to the Russian government, and that the North Korean government was behind WannaCry. Both countries' governments deny charges they are involved in hacking.

'DON'T WASTE YOUR TIME'

The first attacks were reported from Russia and Ukraine.

Russia's Rosneft, one of the world's biggest crude producers by volume, said its systems had suffered "serious consequences," but added oil production had not been affected because it switched over to backup systems.

Ukrainian Deputy Prime Minister Pavlo Rozenko said the government's computer network went down and the central bank reported disruption to operations at banks and firms including the state power distributor.

Danish shipping giant AP Moller-Maersk said it was among the victims, reporting outages at facilities including its Los Angeles terminal.

WPP, the world's largest advertising agency, said it was also infected. A WPP employee who asked not to be named said that workers were told to shut down their computers: "The building has come to a standstill."

A Ukrainian media company said its computers were blocked and it was asked to pay USD300 in the crypto-currency bitcoin to regain access.

"Perhaps you are busy looking for a way to recover your files, but don't waste your time. Nobody can recover your files without our decryption service," the message said, according to a screenshot posted on Ukraine's Channel 24.

Russia's central bank said there were isolated cases of lenders' IT systems being infected. One consumer lender, Home Credit, had to suspend client operations.

Other companies that identified themselves as victims included French construction materials firm Saint Gobain , US drugmaker Merck & Co and Mars Inc's Royal Canin pet food business.

JNPT AFFECTED

India-based employees at Beiersdorf, makers of Nivea skin care products, and Reckitt Benckiser, which owns Enfamil and Lysol, told Reuters the ransomware attack had impacted some of their systems in the country.

AP Moller-Maersk, one of the affected entities globally, operates the Gateway Terminals India (GTI) at JNPT, which has a capacity to handle 1.8 million standard container units.

"We have been informed that the operations at GTI have come to a standstill because their systems are down (due to the malware attack). They are trying to work manually," a senior JNPT official said tonight.

The official explained that JNPT is trying to help the company, but there is little that others can do as the problem s with the systems.

Fearing some clogging up of cargo, additional parking space is being made available, the official said, promising to help in any way that is possible.

Western Pennsylvania's Heritage Valley Health System's entire network was shut down by a cyber attack on Tuesday, according to local media reports.

WANNACRY

Last's month's fast-spreading WannaCry ransomware attack was crippled after a 22-year-old British security researcher Marcus Hutchins created a so-called "kill switch" that experts hailed as the decisive step in slowing the attack.

Security experts said they did not believe that the ransomware released on Tuesday had a kill switch, meaning that it might be harder to stop.

Ukraine's cyber police said on Twitter that a vulnerability in software used by MEDoc, a Ukrainian accounting firm, may have been an initial source of the virus, which researchers including cyber intelligence firm Flashpoint said could have infected victims via an illegitimate software update.

In a Facebook post, MEDoc confirmed it had been hacked but denied responsibility for originating the attack.

An adviser to Ukraine's interior minister said earlier in the day that the virus got into computer systems via "phishing" emails written in Russian and Ukrainian designed to lure employees into opening them.

According to the state security agency, the emails contained infected Word documents or PDF files as attachments.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 27,2020

Global health experts on Wednesday said novel coronavirus is here to stay for more than a year and called for aggressive testing to prevent its spread.

In an interaction with Congress leader Rahul Gandhi, health experts Professor Ashish Jha and Professor Johan Giesecke talked about the COVID-19 pandemic as part of the series being aired on Congress social media channels.

While Jha exuded confidence that a vaccine will be available in a year's time, Prof Giesecke said India should practice a lockdown that is as 'soft' as possible, as a severe lockdown will ruin its economy very quickly.

"When the economy is opened up after lockdown, you have to create confidence among people," Harvard health expert Ashish Jha told Gandhi.

Jha is a professor of Global Health at TH Chan School of Public Health and Director, Harvard Global Health institute.

He said coronavirus is a '12-18 months' problem and the world is not going to be free of this till 2021.

The expert also called for the need for aggressive testing strategy for high-risk areas.

Gandhi, while interacting with the experts, said life is going to change post COVID-19.

"If 9/11 was a new chapter, this will be a new book," he remarked.

Professor Johan Giesecke, former chief scientist, European Centre for Disease Prevention and Control said India should have a 'soft lockdown'.

"The situation that India is in, I think, you should have a soft lockdown, as soft as possible," he said.

"I think for India, you will ruin your economy very quickly if you have a severe lockdown. It is better, skip the lockdown, take care of the old and the frail...," he noted.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 20,2020

New Delhi, Jun 20: After Prime Minister Narendra Modi said there are no foreign incursions into India, China has once again claimed that Galwan valley of Ladakh union territory is located on the Chinese side of the Line of Actual Control (LAC).

In an official statement on the step-by-step account of the Galwan face-off where 20 Indian soldiers were killed, China's foreign ministry spokesperson Zhao Lijian has said the Galwan valley is located on the Chinese side of the LAC in the west section of the China-India boundary.

"For many years, the Chinese border troops have been patrolling and on duty in this region," Zhao said alleging that since April this year, the Indian border troops have unilaterally and continuously built roads, bridges and other facilities at the LAC in the Galwan Valley.

China has lodged representations and protests on multiple occasions but India has gone even further to cross the LAC and make provocations, Zhao said.

By the early morning of May 6, the Indian border troops, who had crossed the LAC by night and trespassed into China's territory, built fortification and barricades, which impeded the patrol of Chinese border troops, Zhao said adding that they deliberately made provocations in an attempt to unilaterally change the status quo of control and management.

The Chinese border troops, he said, were "forced to take necessary measures to respond to the situation on the ground and strengthen management and control in the border areas."

In order to ease the situation, China and India have stayed in close communication through military and diplomatic channels, he said. "In response to the strong demand of the Chinese side, India agreed to withdraw the personnel who crossed the LAC and demolish the facilities, and so they did.

On June 6, the border troops of both countries held a commander-level meeting and reached consensus on easing the situation. The Indian side, he said, promised that they would not cross the estuary of the Galwan river to patrol and build facilities and the two sides would discuss and decide phased withdrawal of troops through the meetings between commanders on the ground.

"Shockingly, on the evening of June 15, India's front-line troops, in violation of the agreement reached at the commander-level meeting, once again crossed the Line of Actual Control for deliberate provocation when the situation in the Galwan Valley was already easing, and even violently attacked the Chinese officers and soldiers who went there for negotiation, thus triggering fierce physical conflicts and causing casualties."

"The adventurous acts of the Indian army have seriously undermined the stability of the border areas, threatened the lives of Chinese personnel, violated the agreements reached between the two countries on the border issue, and breached the basic norms governing international relations," the spokesperson said.

Beijing, he said, hopes that India will work with China, follow faithfully the important consensus reached between the two leaders, abide by the agreements reached between the two governments, and strengthen communication and coordination on properly managing the current situation through diplomatic and military channels, and jointly uphold peace and stability in the border areas.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
January 29,2020

Jan 29: Multiple organisations have called for a Bharat Bandh today in order to protest against the recently passed Citizenship Amendment Act and the proposed National Register of Citizens (NRC). The Bharat  Bandh today has been organised in Surat in Gujarat, Jharkhand and Andhra Pradesh. Increased security measures have been put in place in the three states keeping in view the call for shutdown.

According to media reports, the call for Bharat Bandh was given by Maulana Sajjad Nomani of the All India Muslim Personal Law Board (AIMPLB). This was to protest against the controversial CAA-NRC. This call is supported by an NGO based in Surat, Versatile Minorities Forum (VMF). Apart from the VMF, the call for strikes has been supported by organizations such as Bahujan Kranti Morcha, National Association of Street Vendors of India Surat chapter and the Textile Market Workers' Union.

The workers of the VMF were also spotted distributing pamphlets and urging people to support the strike. Several shopkeepers have also put up notices stating that their shops will be shut for the day.

Earlier, Bharat Bandh was called by 10 trade unions and several bank employees in order to protest against the "anti-people policies of the government" on January 8 and 9. A few violent incidents during this Bharat Bandh were reported in West Bengal.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.