More than 1.3m computer systems are still vulnerable to infection by the cyber attack that swept across the world on Friday, paralysing hospitals, disrupting transport networks and immobilising businesses.
So far, 200,000 computers across 150 countries are known to have been infected in the first wave of the WannaCry cyber attack, Europol, the European police agency, said in a statement on Sunday. Government officials have warned of more potential attacks in the coming week.
"The recent attack is at an unprecedented level and will require a complex international investigation to identify the culprits," Europol said.
Intelligence agencies in
"A lot of preventative work has been undertaken in the last 48 hours to minimise the threat," said one British intelligence official on the risk of a second wave of WannaCry infections.
The list of affected organisations has steadily lengthened in the past 48 hours: alongside
------------------------
More on the cyber attack
● Cyber Attack Survival guide● What is WannaCry and how can it be stopped?● Ransomware's scope means authorities have to act● Security experts dash to contain ransomware attack● NHS fights to restore services after global hack●
------------------------
Despite urgent appeals from law enforcement and security authorities for organisations to address the critical Windows software security vulnerability exploited by WannaCry, many still have not done so.
According to web analysis by the cyber intelligence company Digital Shadows, more than 1.3m computers are still connected to the internet with the vulnerability in their file-sharing protocols unaddressed.
"It's only a matter of time before cyber criminals evolve the WannaCry ransomware malware to become even more virulent,"
WannaCry's potency is based on a cyber weapon known as Eternal Blue, developed by the
Eternal Blue, built by the
The spread of WannaCry was halted early on Friday thanks to the efforts of one anonymous British cyber security researcher, who works under the online pseudonym of Malwaretech. He identified an effective "kill switch" coded into WannaCry by its creators - a web domain sought out by the ransomware before each new infection, which if activated, would automatically halt the infection process. He bought and registered the domain, halting WannaCry's spread.
But he warned that the kill switch could easily be written out of a repurposed version of WannaCry if the ransomware's operators wanted.
"Version 1 of [WannaCry] was stoppable but version 2.0 will likely remove the flaw. You're only safe if you patch ASAP," he tweeted on Sunday, urging companies to apply the Windows software update closes the loophole exploited by Eternal Blue.
Government security officials have also stressed the potential for a new, refined version of WannaCry to be set lose - or for other criminal groups or malicious actors to repurpose the Eternal Blue exploit or other
A senior British security official said that the ransomware component of WannaCry could easily be swapped out for another purpose: "The payload could have simply been a command to wipe the hard drive of the machine entirely," he said. "That would have been devastating and it still could be."
Copyright The Financial Times Limited 2017