Major cyberattack sweeps globe, India affected, Jawaharlal Nehru Port in Mumbai hit

Agencies
June 28, 2017

New Delhi, Jun 28: A major global cyber attack on Tuesday disrupted computers at Russia's biggest oil company, Ukrainian banks and multinational firms with a virus similar to the ransomware that last month infected more than 300,000 computers.

cyberattack

India was also among the countries affected by the ransomware with the country's largest port Jawaharlal Nehru Port Trust in Mumbai shutting down operations at one of its three terminals.

News agency reported that operations at one of the three terminals of the country's largest container port were impacted as a fallout of the global ransomware attack, which crippled some central banks and many large corporations in Europe.

The rapidly spreading cyber extortion campaign underscored growing concerns that businesses have failed to secure their networks from increasingly aggressive hackers, who have shown they are capable of shutting down critical infrastructure and crippling corporate and government networks.

It included code known as "Eternal Blue," which cyber security experts widely believe was stolen from the US National Security Agency (NSA) and was also used in last month's ransomware attack, named "WannaCry."

"Cyber attacks can simply destroy us," said Kevin Johnson, chief executive of cyber security firm Secure Ideas. "Companies are just not doing what they are supposed to do to fix the problem."

The ransomware virus crippled computers running Microsoft Corp's Windows by encrypting hard drives and overwriting files, then demanded USD300 in bitcoin payments to restore access. More than 30 victims paid into the bitcoin account associated with the attack, according to a public ledger of transactions listed on blockchain.info.

Microsoft said the virus could spread through a flaw that was patched in a security update in March.

"We are continuing to investigate and will take appropriate action to protect customers," a spokesman for the company said, adding that Microsoft antivirus software detects and removes it.

RUSSIA AND UKRAINE MOST AFFECTED

Russia and Ukraine were most affected by the thousands of attacks, according to security software maker Kaspersky Lab, with other victims spread across countries including Britain, France, Germany, Italy, Poland and the United States. The total number of attacks was unknown.

Security experts said they expected the impact to be smaller than WannaCry since many computers had been patched with Windows updates in the wake of WannaCry last month to protect them against attacks using Eternal Blue code.

Still, the attack could be more dangerous than traditional strains of ransomware because it makes computers unresponsive and unable to reboot, Juniper Networks said in a blog post analyzing the attack.

Researchers said the attack may have borrowed malware code used in earlier ransomware campaigns known as "Petya" and "GoldenEye".

Following last month's attack, governments, security firms and industrial groups aggressively advised businesses and consumers to make sure all their computers were updated with Microsoft patches to defend against the threat.

The US Department of Homeland Security said it was monitoring the attacks and coordinating with other countries. It advised victims not to pay the extortion, saying that doing so does not guarantee access will be restored.

In a statement, the White House National Security Council said there was currently no risk to public safety. The United States was investigating the attack and determined to hold those responsible accountable, it said.

The NSA did not respond to a request for comment. The spy agency has not publicly said whether it built Eternal Blue and other hacking tools leaked online by an entity known as Shadow Brokers.

Several private security experts have said they believe Shadow Brokers is tied to the Russian government, and that the North Korean government was behind WannaCry. Both countries' governments deny charges they are involved in hacking.

'DON'T WASTE YOUR TIME'

The first attacks were reported from Russia and Ukraine.

Russia's Rosneft, one of the world's biggest crude producers by volume, said its systems had suffered "serious consequences," but added oil production had not been affected because it switched over to backup systems.

Ukrainian Deputy Prime Minister Pavlo Rozenko said the government's computer network went down and the central bank reported disruption to operations at banks and firms including the state power distributor.

Danish shipping giant AP Moller-Maersk said it was among the victims, reporting outages at facilities including its Los Angeles terminal.

WPP, the world's largest advertising agency, said it was also infected. A WPP employee who asked not to be named said that workers were told to shut down their computers: "The building has come to a standstill."

A Ukrainian media company said its computers were blocked and it was asked to pay USD300 in the crypto-currency bitcoin to regain access.

"Perhaps you are busy looking for a way to recover your files, but don't waste your time. Nobody can recover your files without our decryption service," the message said, according to a screenshot posted on Ukraine's Channel 24.

Russia's central bank said there were isolated cases of lenders' IT systems being infected. One consumer lender, Home Credit, had to suspend client operations.

Other companies that identified themselves as victims included French construction materials firm Saint Gobain , US drugmaker Merck & Co and Mars Inc's Royal Canin pet food business.

JNPT AFFECTED

India-based employees at Beiersdorf, makers of Nivea skin care products, and Reckitt Benckiser, which owns Enfamil and Lysol, told Reuters the ransomware attack had impacted some of their systems in the country.

AP Moller-Maersk, one of the affected entities globally, operates the Gateway Terminals India (GTI) at JNPT, which has a capacity to handle 1.8 million standard container units.

"We have been informed that the operations at GTI have come to a standstill because their systems are down (due to the malware attack). They are trying to work manually," a senior JNPT official said tonight.

The official explained that JNPT is trying to help the company, but there is little that others can do as the problem s with the systems.

Fearing some clogging up of cargo, additional parking space is being made available, the official said, promising to help in any way that is possible.

Western Pennsylvania's Heritage Valley Health System's entire network was shut down by a cyber attack on Tuesday, according to local media reports.

WANNACRY

Last's month's fast-spreading WannaCry ransomware attack was crippled after a 22-year-old British security researcher Marcus Hutchins created a so-called "kill switch" that experts hailed as the decisive step in slowing the attack.

Security experts said they did not believe that the ransomware released on Tuesday had a kill switch, meaning that it might be harder to stop.

Ukraine's cyber police said on Twitter that a vulnerability in software used by MEDoc, a Ukrainian accounting firm, may have been an initial source of the virus, which researchers including cyber intelligence firm Flashpoint said could have infected victims via an illegitimate software update.

In a Facebook post, MEDoc confirmed it had been hacked but denied responsibility for originating the attack.

An adviser to Ukraine's interior minister said earlier in the day that the virus got into computer systems via "phishing" emails written in Russian and Ukrainian designed to lure employees into opening them.

According to the state security agency, the emails contained infected Word documents or PDF files as attachments.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
March 4,2020

New Delhi, Mar 4: A court in Delhi on Wednesday convicted expelled BJP MLA Kuldeep Singh Sengar of culpable homicide not amounting to murder in the death of the Unnao rape victim's father.

District judge Dharmesh Sharma said Sengar had no intention of killing the victim's father. “He was beaten in a brutal manner that led to his death,” the judge said.

The court had sent Sengar to jail on December 20 for the “remainder of his natural biological life” for raping the woman in 2017, when she was a minor.

The Central Bureau of Investigation (CBI) had examined 55 witnesses in support of the case and the defence examined nine witnesses.

The court had recorded the statements of the rape survivor's uncle, mother, sister and one of her father's colleague who claimed to be an eyewitness to the incident.

Charges were framed against Sengar, his brother Atul, Bhadauria, sub-inspector Kamta Prasad, constable Amir Khan and six others in the case.

The case was transferred to Delhi from a trial court in Uttar Pradesh on the directions of the Supreme Court on August 1 last year.

In July, 2019 a truck rammed into the car the rape victim was travelling in with some family members and her lawyer.

Two of her aunts died in the incident. She was airlifted from a hospital in Lucknow and to AIIMS in Delhi.

The victim has been provided accommodation in Delhi and is under CRPF protection.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
July 11,2020

New Delhi, Jul 11: India's COVID-19 case count crossed the eight lakh-mark on Saturday with yet another highest single-day spike of 27,114 new cases in the last 24 hours.

As many as 519 deaths were reported during this period.

The total number of positive cases in the country stands at 8,20,916, including 2,83,407 active cases, 5,15,386 cured/discharged/migrated and 22,123 deaths, according to the Ministry of Health and Family Welfare.

With as many as 2,38,461 COVID-19 cases, Maharashtra continues to remain the worst-affected state, followed by Tamil Nadu (1,30,261) and Delhi (1,09,140).

Meanwhile, 1,13,07,002 samples have been tested for COVID-19 till July 10. Out of these 2,82,511 samples were tested yesterday, according to the Indian Council of Medical Research (ICMR).

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 4,2020

New Delhi, May 4: The country's manufacturing sector activity witnessed unprecedented contraction in April amid national lockdown restrictions, following which new business orders collapsed at a record pace and firms sharply reduced their staff numbers, a monthly survey said on Monday.

The headline seasonally adjusted IHS Markit India Manufacturing Purchasing Managers' Index (PMI) fell to 27.4 in April, from 51.8 in March, reflecting the sharpest deterioration in business conditions across the sector since data collection began over 15 years ago.
The index slipped into contraction mode, after remaining in the growth territory for 32 consecutive months.

In PMI parlance, a print above 50 means expansion, while a score below that denotes contraction.

Amid widespread business closures, demand conditions were severely hampered in April. New orders fell for the first time in two-and-a-half years and at the sharpest rate in the survey's history, far outpacing that seen during the global financial crisis, the survey said.

"After making it through March relatively unscathed, the Indian manufacturing sector felt the full force of the coronavirus pandemic in April," said Eliot Kerr, Economist at IHS Markit.
Panellists attributed lower production to temporary factory closures that were triggered by restrictive measures to limit the spread of COVID-19.

Export orders also witnessed a sharp decline. Following the first reduction since October 2017 during March, foreign sales fell at a quicker rate in April. "In fact, the rate of decline accelerated to the fastest since the series began over 15 years ago," the survey said.

On the employment front, deteriorating demand conditions saw manufacturers drastically cut back staff numbers in April. The reduction in employment was the quickest in the survey's history.

"In the latest survey period, record contractions in output, new orders and employment pointed to a severe deterioration in demand conditions.
“Meanwhile, there was evidence of unprecedented supply-side disruption, with input delivery times lengthening to the greatest extent since data collection began in March 2005," Kerr said.

On the prices front, both input costs and output prices were lowered markedly as suppliers and manufacturers themselves offered discounts in an attempt to secure orders.

Going ahead, sentiment regarding the 12-month outlook for production ticked up from March's recent low on hopes that demand will rebound once the COVID-19 threat has diminished and lockdown restrictions eased.

"There was a hint of positivity when looking at firms' 12-month outlooks, with sentiment towards future activity rebounding from March's record low. That said, the degree of optimism remained well below the historical average," Kerr said.

In India, the death toll due to COVID-19 rose to 1,373 and the number of cases climbed to 42,533 as on Monday, according to the health ministry.

Meanwhile, the coronavirus-induced lockdown has been extended beyond May 4, for another two weeks in the country.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.