The figure could climb as new infections were reported in Asia.
However staff beginning the working week have been told to be careful.
Ultimately, the ransomware outbreak will only end when users and IT professionals around the world update their software to eliminate the security flaw that the malware exploited.
"There are so many states that have been affected".
The "WannaCry" attack grabbed headlines around the world because of its scale, but it's just one of many types of ransomware that cybersecurity experts see every day.
On Monday, about $38,000 were already paid to those behind the attacks, the BBC reported.
It's a rare occurrence that I find myself defending Microsoft's actions but the rampant finger pointing after the WannaCrypt ransomware is an all-to-often reminder that Windows should be treated as a mission critical application and not a microwave that warms up your food.
Among the organisations targeted worldwide have been Germany's rail network Deutsche Bahn, Spanish telecommunications operator Telefonica, US logistics giant FedEx and Russia's interior ministry.
Many firms employed experts over the weekend to try to prevent new infections.
Senior spokesman for Europol, Jan Op Gen Oorth, told Agence France-Presse: "The number of victims appears not to have gone up and so far the situation seems stable in Europe, which is a success".
Carmaker Renault said its plant in the northern town of Douai would not reopen on Monday as it dealt with the cyber-attack.
Seven trusts, including St Barts in London and the York Teaching Hospitals NHS Trust, have experienced serious problems and require "extra support".
Logan Noir: Watch the Hugh Jackman & James Mangold Q&A
Reported by CinemaBlend, Jackman revealed, "When I read it, I thought, 'That's attractive .' It seemed very poetic on the page". Logan marked Hugh Jackman's final performance as Wolverine after having played the popular X-Men hero for nearly two decades.
South Korea: Only nine ransomware cases.
This won't take long. Further, software built over a decade ago is not designed for modern hardware or sophisticated attacks that we frequently see today.
Never open attachments in emails from someone you don't know.
The message from the UK's National Crime Agency was "do not pay!" - there is no guarantee that systems will be restored. In digital years, that's old.
A 22-year-old British tech nerd halted the attack after purchasing a $10.69 internet domain name that improbably held the kill switch to thwart the strike.
The malware was spread via an SMB exploit in Windows, first publicised in February by the Shadow Brokers malware group, but patched by Microsoft in March.
Blaming the ransomware attack on stockpiling of vulnerabilities by governments, Microsoft said, "vulnerabilities stored by the Central Intelligence Agency show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world".
In a blog post, he said: "An equivalent scenario with conventional weapons would be the United States military having some of its Tomahawk missiles stolen". A big reason for this: They have expensive machinery like MRI machines that was created to work with Windows XP and doesn't work with more modern operating systems.
In what one of the most significant cyberattacks ever recorded, computer systems from the U.K.to Russia, Brazil and the US were hit beginning Friday by malicious software that exploited a vulnerability in Microsoft's Windows operating system.
There are going to be some tough questions on Monday for those institutions which didn't do enough to keep their networks secure, as well as the organisations that were best placed to stop it happening in the first place - the NSA and Microsoft. Cybersecurity experts say the unknown hackers who launched the attacks used a vulnerability that was exposed in NSA documents leaked online. If using Windows, don't disable automatic Windows updates. "We are expecting it and have informed the banks, since most of our ATMs run on the windows operating system which is the operating system effected by WannaCry", Subhamangala added.
Tim Stevens, a lecturer in global security at King's College London, warned that the incident should be a wakeup call to both the public and private sectors to incorporate security into computer systems from the ground up, rather than as an afterthought.