According to Wainwright, the attack affected 200,000 users in 150 countries, including businesses and large corporations.
In what one of the most significant cyberattacks ever recorded, computer systems from the U.K.to Russia, Brazil and the USA were hit beginning Friday by malicious software that exploited a vulnerability in Microsoft's Windows operating system. "And our concern is the way in which this - for the first time we've seen something that combines the ransomware with a worm functionality", said Europol Executive Director Rob Wainwright. Smith compared the leak of NSA exploits to the theft of missiles from the American military, pointing to the WikiLeaks dump of Central Intelligence Agency hacking tools. It was a security flaw that was originally exploited by the U.S. National Security Agency (NSA) which was then leaked earlier this year.
Once the emails were open and the computers infected, the ransomware encrypted data demanded payment to restore access to files.
Furthermore, Smith emphasized that governments' stockpiling of vulnerabilities is a problem. He said governments need to consider the damage that comes from hoarding these vulnerabilities. The malicious software has reportedly infected computers in up to a hundred countries and tried to extort users' money. The attack was so overarching that it even affected notably older iterations like Windows XP and Windows Server 2003, forcing the company to release updates to address now-obvious vulnerabilities.
In China, "hundreds of thousands" of computers at almost 30,000 institutions and organizations were infected by late Saturday, according to Qihoo 360, one of China's largest providers of antivirus software.
Dutch King Secretly Flew for Airline
Now the king will be heading back to flight school for training on Boeing 737 jets that are taking the place of the Fokker fleet. Willem-Alexander would ferry passengers on short-haul flights for KLM Royal Dutch Airlines, according to the Dutch government.
Microsoft, Apple Inc., and others have pushed back against efforts by those agencies to seek technical backdoors in their products to monitor targets, because the tech companies fear the perception of complicity with the US government could alienate customers in the USA and overseas.
Shortly after WannaCry began to spread, a security researcher accidentally found a kill switch that appeared to stop WannaCry in its tracks.
While the perpetrators have yet to be identified, authorities across the globe are urging that those experiencing the attack not pay the ransom.
The attack also proves how potentially risky massive computer disruptions can be.
The spread ended when a MI researcher discovered a kill switch in the malware and shared the information with a British counterpart who had stopped the attack by registering a domain name. "As cybercriminals become more sophisticated, there is simply no way for customers to protect themselves against threats unless they update their systems".