As per a NDTV report, WannaCry was stopped in its tracks by a British researcher, but it did infect almost 2 lakh computers worldwide.
Kaspersky has listed Vietnam among the top 20 countries most affected by this ransomware; the other countries and territories include Russia, Ukraine, India, Taiwan, and mainland China.
If your system is on the recent version of Windows and hasn't been attacked by WannaCry yet, then we urge you to update your system with the available security patch immediately. Unfortunately once programmes like WannaCry encrypt user data, it is extraordinarily hard to retrieve without either paying the ransom or restoring the files from a backup, leaving preparation and prevention essential in the absence of a reliable cure. Some of the victims have reportedly regained access to their files after paying, although security experts advise against complying with ransom demands.
"The governments of the world should treat this attack as a wake-up call". "They need to take a different approach and adhere in cyberspace to the same rules applied to weapons in the physical world".
Former NSA contractor and whistleblower Edward Snowden echoed that criticism on Twitter. "There's no waving that away".More news: What Will Fall's Windows 10 Update Bring?
Washington has banned Chinese tech firms in the United States in the days after the attack, but the newspaper said there was "no credible evidence" to support the ban. "It is deeply disturbing the National Security Agency likely wrote the original malware". The 22-year-old cyber security researcher has warned everyone to patch their systems before it's too late to escape the attack. Activating the domain worked as a kill switch for the malware.
The State Bank of Vietnam on May 15 confirmed that no Vietnamese credit institutions were affected by the WannaCry ransomware. However, as of this morning, there haven't been any signs of widespread renewed activity. Critics of the NSA have stated that only a government agency like the NSA would be capable of producing such sophisticated and powerful computer viruses.
"Two months prior to the May 12 attack, Microsoft received a tip regarding the server vulnerability".
The Department of Homeland Security began an "aggressive awareness campaign" to alert the tech industry to the importance of installing the patch that Microsoft issued in March that protected users from the vulnerability exploited by the attack, a USA official working on the attack told Reuters. "As cybercriminals become more sophisticated, there is simply no way for customers to protect themselves against threats unless they update their systems".