Major cyberattack sweeps globe, India affected, Jawaharlal Nehru Port in Mumbai hit

Agencies
June 28, 2017

New Delhi, Jun 28: A major global cyber attack on Tuesday disrupted computers at Russia's biggest oil company, Ukrainian banks and multinational firms with a virus similar to the ransomware that last month infected more than 300,000 computers.

cyberattack

India was also among the countries affected by the ransomware with the country's largest port Jawaharlal Nehru Port Trust in Mumbai shutting down operations at one of its three terminals.

News agency reported that operations at one of the three terminals of the country's largest container port were impacted as a fallout of the global ransomware attack, which crippled some central banks and many large corporations in Europe.

The rapidly spreading cyber extortion campaign underscored growing concerns that businesses have failed to secure their networks from increasingly aggressive hackers, who have shown they are capable of shutting down critical infrastructure and crippling corporate and government networks.

It included code known as "Eternal Blue," which cyber security experts widely believe was stolen from the US National Security Agency (NSA) and was also used in last month's ransomware attack, named "WannaCry."

"Cyber attacks can simply destroy us," said Kevin Johnson, chief executive of cyber security firm Secure Ideas. "Companies are just not doing what they are supposed to do to fix the problem."

The ransomware virus crippled computers running Microsoft Corp's Windows by encrypting hard drives and overwriting files, then demanded USD300 in bitcoin payments to restore access. More than 30 victims paid into the bitcoin account associated with the attack, according to a public ledger of transactions listed on blockchain.info.

Microsoft said the virus could spread through a flaw that was patched in a security update in March.

"We are continuing to investigate and will take appropriate action to protect customers," a spokesman for the company said, adding that Microsoft antivirus software detects and removes it.

RUSSIA AND UKRAINE MOST AFFECTED

Russia and Ukraine were most affected by the thousands of attacks, according to security software maker Kaspersky Lab, with other victims spread across countries including Britain, France, Germany, Italy, Poland and the United States. The total number of attacks was unknown.

Security experts said they expected the impact to be smaller than WannaCry since many computers had been patched with Windows updates in the wake of WannaCry last month to protect them against attacks using Eternal Blue code.

Still, the attack could be more dangerous than traditional strains of ransomware because it makes computers unresponsive and unable to reboot, Juniper Networks said in a blog post analyzing the attack.

Researchers said the attack may have borrowed malware code used in earlier ransomware campaigns known as "Petya" and "GoldenEye".

Following last month's attack, governments, security firms and industrial groups aggressively advised businesses and consumers to make sure all their computers were updated with Microsoft patches to defend against the threat.

The US Department of Homeland Security said it was monitoring the attacks and coordinating with other countries. It advised victims not to pay the extortion, saying that doing so does not guarantee access will be restored.

In a statement, the White House National Security Council said there was currently no risk to public safety. The United States was investigating the attack and determined to hold those responsible accountable, it said.

The NSA did not respond to a request for comment. The spy agency has not publicly said whether it built Eternal Blue and other hacking tools leaked online by an entity known as Shadow Brokers.

Several private security experts have said they believe Shadow Brokers is tied to the Russian government, and that the North Korean government was behind WannaCry. Both countries' governments deny charges they are involved in hacking.

'DON'T WASTE YOUR TIME'

The first attacks were reported from Russia and Ukraine.

Russia's Rosneft, one of the world's biggest crude producers by volume, said its systems had suffered "serious consequences," but added oil production had not been affected because it switched over to backup systems.

Ukrainian Deputy Prime Minister Pavlo Rozenko said the government's computer network went down and the central bank reported disruption to operations at banks and firms including the state power distributor.

Danish shipping giant AP Moller-Maersk said it was among the victims, reporting outages at facilities including its Los Angeles terminal.

WPP, the world's largest advertising agency, said it was also infected. A WPP employee who asked not to be named said that workers were told to shut down their computers: "The building has come to a standstill."

A Ukrainian media company said its computers were blocked and it was asked to pay USD300 in the crypto-currency bitcoin to regain access.

"Perhaps you are busy looking for a way to recover your files, but don't waste your time. Nobody can recover your files without our decryption service," the message said, according to a screenshot posted on Ukraine's Channel 24.

Russia's central bank said there were isolated cases of lenders' IT systems being infected. One consumer lender, Home Credit, had to suspend client operations.

Other companies that identified themselves as victims included French construction materials firm Saint Gobain , US drugmaker Merck & Co and Mars Inc's Royal Canin pet food business.

JNPT AFFECTED

India-based employees at Beiersdorf, makers of Nivea skin care products, and Reckitt Benckiser, which owns Enfamil and Lysol, told Reuters the ransomware attack had impacted some of their systems in the country.

AP Moller-Maersk, one of the affected entities globally, operates the Gateway Terminals India (GTI) at JNPT, which has a capacity to handle 1.8 million standard container units.

"We have been informed that the operations at GTI have come to a standstill because their systems are down (due to the malware attack). They are trying to work manually," a senior JNPT official said tonight.

The official explained that JNPT is trying to help the company, but there is little that others can do as the problem s with the systems.

Fearing some clogging up of cargo, additional parking space is being made available, the official said, promising to help in any way that is possible.

Western Pennsylvania's Heritage Valley Health System's entire network was shut down by a cyber attack on Tuesday, according to local media reports.

WANNACRY

Last's month's fast-spreading WannaCry ransomware attack was crippled after a 22-year-old British security researcher Marcus Hutchins created a so-called "kill switch" that experts hailed as the decisive step in slowing the attack.

Security experts said they did not believe that the ransomware released on Tuesday had a kill switch, meaning that it might be harder to stop.

Ukraine's cyber police said on Twitter that a vulnerability in software used by MEDoc, a Ukrainian accounting firm, may have been an initial source of the virus, which researchers including cyber intelligence firm Flashpoint said could have infected victims via an illegitimate software update.

In a Facebook post, MEDoc confirmed it had been hacked but denied responsibility for originating the attack.

An adviser to Ukraine's interior minister said earlier in the day that the virus got into computer systems via "phishing" emails written in Russian and Ukrainian designed to lure employees into opening them.

According to the state security agency, the emails contained infected Word documents or PDF files as attachments.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 12,2020

New Delhi, May 12: With 3,604 more COVID-19 cases reported in the last 24 hours, India's tally of coronavirus cases reached 70,756, said the Union Ministry of Health and Family Welfare on Tuesday. 87 deaths were reported during the period.

As per the tally, 46,008 patients are active coronavirus cases while 22,454 patients have been cured/discharged and one patient has migrated.

With 87 deaths due to COVID-19 reported in the last 24 hours, the number of deaths has risen to 2,293.

As per the ministry, Maharashtra has the most number of coronavirus cases with 23,401 cases with 4,786 patients being cured/discharged while 868 deaths have been reported in the state.

Gujarat is second on the list with 8,541 cases that include 2,780 patients recovering from the disease and 513 fatalities.

Tamil Nadu's tally reached 8,002 cases, including 2,051 recoveries and 53 deaths.

While Delhi's tally stands at 7,233 cases with 2,129 patients recovered and 73 deaths.

Meanwhile; Mizoram (one case reported--now recovered), Goa (seven cases reported and all seven recovered), Manipur (Two cases reported and both patients recovered) and Arunachal Pradesh (one case reported--now recovered) have reported no new cases in the last 24 hours.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 4,2020

New Delhi, Jan 4: In more troubles for the former Finance Minister and senior Congress leader P Chidambaram, the Enforcement Directorate (ED) on Friday questioned him for over six hours in its probe into the Air India aircraft deal case, first time since his release from Tihar jail almost a month ago.

A senior ED official told IANS, "We questioned Chidambaram for over six hours today in the ongoing probe into the Air India deal with Airbus."

According to financial probe agency officials, Air India had planned to buy over 111 aircraft from Airbus and Boeing during the erstwhile United Progressive Alliance (UPA) government in 2009. This is the first time the ED has questioned the senior Congress leader in the Air India deal case.

The questioning of Chidambaram came for the first time since his release from the Tihar jail where he spent 106 days in connection with the INX Media money laundering case. He was released from Tihar on December 4 last year after he was granted bail by the Supreme Court. The former finance minister is also being investigated by the ED in a separate money-laundering cases of Aircel-Maxis deal.

An ED official said the contract to buy 43 aircraft from Airbus was finalised by a panel of ministers headed by Chidambaram in 2009. According to the ED, when the proposal to buy 43 aircraft from Airbus was sent to the Cabinet Committee on Security (CCS), there was a condition that the aircraft manufacturer would have to build training facilities and MRO (Maintenance, Repair and Overhaul) centres at a cost of Rs 70,000 crore. But later, when the purchase order was placed, the clause was removed.

The name of another UPA minister, Praful Patel, had also come up in the alleged scam in a charge sheet filed by the ED against corporate lobbyist Deepak Talwar on March 30 last year. Talwar was arrested last year by the ED after he was deported from the UAE.

The ED is probing the Air India-Indian Airlines merger; purchase of 111 aircraft from Boeing and Airbus at Rs 70,000 crore; ceding profitable routes and schedules to private airlines, and opening of training institutes with foreign investment.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 27,2020

Hyderabad, Jun 27: Ahead nurse working with a state-run hospital here died on Friday while undergoing treatment for COVID-19, a hospital official said.

The nurse, who was due to retire this month-end, tested positive about 10 days ago, he said.

The woman, who had been on medical leave for about 20 days, is suspected to have contracted the virus when she attended a private function in a neighbouring district, he said.

She was treated at the hospital for two days after she was found positive for COVID-19.

However, she was shifted to another government hospital as the symptoms continued unabated and sugar levels were high, he said.

The woman, who had comorbidities like diabetes and hypertension, died today.

Meanwhile, about 20 healthcare personnel, including doctors and paramedical staff, have so far tested positive for COVID-19 at the state-run Gandhi hospital, according to a hospital official.

He also said that there are around 50 patients whose family members have not come forward to take them home though the patients can be in home quarantine.

Family members have cited reasons such as residents not allowing a positive patient to return to the villages and presence of children at residences, for not taking them home, he added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.