{"id":1932,"date":"2017-05-17T15:19:32","date_gmt":"2017-05-17T18:19:32","guid":{"rendered":"https:\/\/www.nachodelatorre.com.ar\/mosconi\/?p=1932"},"modified":"2017-05-17T15:19:32","modified_gmt":"2017-05-17T18:19:32","slug":"el-ciberataque-wannacry-se-desvanece-pero-los-expertos-ven-mas-riesgos","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=1932","title":{"rendered":"El ciberataque &#8216;WannaCry&#8217; se desvanece, pero los expertos ven m\u00e1s riesgos"},"content":{"rendered":"<p>El ciberataque &#8216;ransomware&#8217; que ha golpeado a empresas y gobiernos de todo el mundo disminuy\u00f3 en intensidad el lunes 15, aunque expertos advirten que podr\u00edan surgir nuevas versiones del virus. Miles de infecciones fueron reportadas en gran parte en Asia. Sin embargo, los casos estaban m\u00e1s contenidos que el brote sist\u00e9mico del viernes 12 que paraliz\u00f3 la semana pasada las computadoras que operaban f\u00e1bricas, bancos, agencias gubernamentales y sistemas de transporte alrededor del mundo.<!--more--><\/p>\n<p><img loading=\"lazy\" class=\"attachment-post-thumbnail wp-post-image alignright\" src=\"http:\/\/fifthdomain.com\/wp-content\/uploads\/2017\/05\/AP17133191234349-810x540-810x540.jpg\" alt=\"AP17133191234349.jpg\" width=\"398\" height=\"265\" \/>LONDON (AP) \u2014 The \u201cransomware\u201d cyberattack that has hit companies and governments around the world ebbed in intensity on Monday, though experts warned that new versions of the virus could emerge.<\/p>\n<p>Thousands more infections were reported Monday, largely in Asia, which had been closed for business when the malware first struck Friday. The cases were more contained, however, than the systemic outbreak that last week paralyzed computers running factories, banks, government agencies and transport systems around the world.<\/p>\n<p>Many of the 200,000 victims in more than 150 countries were still struggling to recover from the first attack of the so-called \u201cWannaCry\u201d virus.<\/p>\n<p>Carmaker Renault said one of its French plants, which employs 3,500 people, wasn\u2019t reopening Monday as a \u201cpreventative step.\u201d<\/p>\n<p>Britain\u2019s National Health Service said about a fifth of NHS trusts \u2014 the regional bodies that run hospitals and clinics \u2014 were hit by the attack on Friday, leading to thousands of canceled appointments and operations. Seven of the 47 affected trusts were still having IT problems Monday.<\/p>\n<p>As cybersecurity firms worked around the clock to monitor the situation and install a software patch, new variants of the rapidly replicating malware were discovered Sunday. One did not include the so-called kill switch that allowed researchers to interrupt the malware\u2019s spread Friday by diverting it to a dead end on the internet.<\/p>\n<p>Ryan Kalember, senior vice president at Proofpoint Inc., which helped stop its spread, said the version without a kill switch could spread. It was benign because it contained a flaw that prevented it from taking over computers and demanding ransom to unlock files but other more malicious ones will likely pop up.<\/p>\n<p>\u201cWe haven\u2019t fully dodged this bullet at all until we\u2019re patched against the vulnerability itself,\u201d Kalember said.<\/p>\n<p>Lynne Owens, director-general of Britain\u2019s National Crime Agency, said there was no indication of a second surge of the cyberattack, \u201cBut that doesn\u2019t mean there won\u2019t be one.\u201d<\/p>\n<p>Tim Stevens, a lecturer in global security at King\u2019s College London, said the incident should be a wakeup call to both the public and private sectors to incorporate security into computer systems from the ground up, rather than as an afterthought.<\/p>\n<p>\u201cThis thing cannot be brushed under the carpet,\u201d he said. \u201cIt is so visible and so global. There is going to have to be change at levels where change can be made.\u201d<\/p>\n<p>On Monday, Chinese state media said 29,372 institutions there had been infected along with hundreds of thousands of devices.<\/p>\n<p>Universities and other educational institutions in the country were among the hardest hit, possibly because schools tend to have old computers and be slow to update operating systems and security.<\/p>\n<p>On social media, students complained about not being able to access their work, and people in various cities said they hadn\u2019t been able to take their driving tests because some local traffic police systems were down.<\/p>\n<p>Railway stations, mail delivery, gas stations, hospitals, office buildings, shopping malls and government services also were reportedly affected.<\/p>\n<p>In Japan, 2,000 computers at 600 locations were reported to have been affected. Companies including Hitachi and Nissan Motor Co. reported problems but said they had not seriously affected their operations. In Indonesia, the malware locked patient files on computers in two hospitals in the capital, Jakarta, causing delays.<\/p>\n<p>In Britain, the government denied allegations that lax cybersecurity in the financially stretched, state-funded health service had helped the attack spread.<\/p>\n<p>Prime Minister Theresa May said \u201cwarnings were given to hospital trusts\u201d about the Microsoft vulnerability exploited by the attackers.<\/p>\n<p>NHS Digital, which oversees U.K. hospital cybersecurity, said it sent alerts about the problem \u2014 and a patch to fix it \u2014 to health service staff and IT professionals last month.<\/p>\n<p>Experts urged organizations and companies to immediately update older Microsoft operating systems, such as Windows XP, with a patch released by Microsoft Corp. to limit vulnerability to a more powerful version of the malware \u2014 or to future versions that can\u2019t be stopped.<\/p>\n<p>The attack held users hostage by freezing their computers, popping up a red screen with the words, \u201cOops, your files have been encrypted!\u201d and demanding money through online bitcoin payment \u2014 $300 at first, rising to $600 before it destroys files hours later.<\/p>\n<p>Microsoft distributed a patch two months ago that protected computers from such an attack, but in many organizations it was likely lost among the blizzard of updates and patches that large corporations and governments strain to manage.<\/p>\n<p>The president of Microsoft laid some of the blame at the feet of the U.S. government. Brad Smith criticized U.S. intelligence agencies, including the CIA and National Security Agency, for \u201cstockpiling\u201d software code that can be used by hackers. Cybersecurity experts say the unknown hackers who launched the attacks used a vulnerability that was exposed in NSA documents leaked online.<\/p>\n<p>Tom Bossert, a homeland security adviser to President Donald Trump, said \u201ccriminals\u201d were responsible, not the U.S. government. Bossert said the U.S. hasn\u2019t ruled out involvement by a foreign government, but that the recent ransom demands suggest a criminal network.<\/p>\n<p>Bossert told ABC\u2019s \u201cGood Morning America\u201d that the attack is something that \u201cfor right now, we\u2019ve got under control\u201d in the United States.<\/p>\n<p>So far, not many people have paid the ransom demanded by the malware, Europol spokesman Jan Op Gen Oorth told The Associated Press.<\/p>\n<p>Eiichi Moriya, a cybersecurity expert and professor at Meiji University, warned that paying the ransom would not guarantee a fix.<\/p>\n<p>\u201cYou are dealing with a criminal,\u201d he said. \u201cIt\u2019s like after a robber enters your home. You can change the locks but what has happened cannot be undone.\u201d<\/p>\n<p><strong>Fuente:<\/strong> <em><a href=\"http:\/\/fifthdomain.com\/2017\/05\/15\/wannacry-virus-spreads-to-asia-experts-warn-of-new-wave-coming\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/fifthdomain.com<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El ciberataque &#8216;ransomware&#8217; que ha golpeado a empresas y gobiernos de todo el mundo disminuy\u00f3 en intensidad el lunes 15, aunque expertos advirten que podr\u00edan&hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,29],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/1932"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1932"}],"version-history":[{"count":0,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/1932\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1932"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1932"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1932"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}