Connect with us

Markets

Cyberattack Is Blunted as Governments, Companies Gain Upper Hand

Published

on

e-banking fraud
  • Cyberattack Is Blunted as Governments, Companies Gain Upper Hand

Governments and companies around the world began to gain the upper hand against the first wave of an unrivaled global cyberattack, even as the assault was poised to continue claiming victims this week.

More than 200,000 computers in at least 150 countries have so far been infected, according to Europol, the European Union’s law enforcement agency. The U.K.’s National Cyber Security Centre said new cases of so-called ransomware are possible “at a significant scale.”

“For now, it does not look like the number of infected computers is increasing,” said a Europol spokesman. “We will get a decryption tool eventually, but for the moment, it’s still a live threat and we’re still in disaster recovery mode.”

At Germany’s national Deutsche Bahn railroad, workers were laboring under “high pressure” Monday to repair remaining glitches with train stations’ electronic departure boards, a spokesman said.

French car-maker Renault SA, which halted production at some factories to stop the virus from spreading, said 90 percent of factories worldwide had now resumed operations, according to a spokesman Monday.

A new version of the ransomware may have also been spreading over the weekend. Matt Suiche, founder of United Arab Emirates-based cyber security firm Comae Technologies, said around 10,000 machines have been infected by the second variation of the malware.

The malware used a technique purportedly stolen from the U.S. National Security Agency. It affected the U.K.’s National Health Service, Russia’s Ministry of Interior, China government agencies, Deutsche Bahn, automakers Nissan Motor Co. and Renault, PetroChina, logistics giant FedEx Corp., and other company and hospital computer systems in countries from Eastern Europe to the U.S. and Asia.

The hackers used the tool to encrypt files within affected computers, making them inaccessible, and demanded ransom — typically $300 in bitcoin. Russia and Ukraine had a heavy concentration of infections, according to Dutch security company Avast Software BV.

Microsoft Corp. President Brad Smith, in a blog post Sunday, said the attack is a “wake-up call” for governments in the U.S. and elsewhere to stop stockpiling tools to exploit digital vulnerabilities. “They need to take a different approach and adhere in cyberspace to the same rules applied to weapons in the physical world,” he said.

Normal Operations

About 97 percent of U.K. facilities and doctors disabled by the attack were back to normal operation, Home Secretary Amber Rudd said Saturday after a government meeting. At the height of the attack Friday and early Saturday, 48 organizations in the NHS were affected, and hospitals in London, North West England and Central England urged people with non-emergency conditions to stay away as technicians tried to stop the spread of the malicious software.

The initial attack was stifled when a security researcher disabled a key mechanism used by the worm to spread, but experts said the hackers were likely to mount a second attack because so many users of personal computers with Microsoft operating systems couldn’t or didn’t download a security patch released in March that Microsoft had labeled “critical.”

Microsoft said in a blog post Saturday that it was taking the “highly unusual“ step of providing the patch for older versions of Windows it was otherwise no longer supporting, including Windows XP and Windows Server 2003.

While the scale of the attack shows Microsoft needs to strengthen its own capabilities, “there is simply no way for customers to protect themselves against threats unless they update their system,” Smith said in his blog post. “Otherwise they’re literally fighting the problems of the present with tools from the past.

“This attack is a powerful reminder that information technology basics like keeping computers current and patched are a high responsibility for everyone, and it’s something every top executive should support.”

Victims have paid about $50,000 in ransom so far, with the total expected to rise, said Tom Robinson, chief operating officer and co-founder of Elliptic Enterprises Ltd., a ransomware consultant that works with banks and companies in the U.K., U.S. and Europe. Robinson, in an interview by email, said he calculated the total based on payments tracked to bitcoin addresses specified in the ransom demands.

Last year an acute-care hospital in Hollywood paid $17,000 in bitcoin to an extortionist who hijacked its computer systems and forced doctors and staff to revert to pen and paper for record-keeping.

Business Targets

A spokesman for Spain’s Telefonica SA said the hack affected some employees at its headquarters, but the phone company is attacked frequently and the impact of Friday’s incident wasn’t major. FedEx said it was “experiencing interference,” the Associated Press reported.

Renault halted production at some factories to stop the virus from spreading, a spokesman said Saturday, while Nissan’s car plant in Sunderland, in northeast England, was affected without causing any major impact on business, an official said.

Russia’s Interior Ministry, with oversight of the police forces, said about “1,000 computers were infected,” which it described as less than 1 percent of the total, according to its website.

In China, the malware affected computers at “several” unspecified government departments, the country’s Cyberspace Administration said on its WeChat blog Monday. Since that initial attack, agencies and companies from the police to banks and communications firms have put preventive measures in place, while Qihoo 360 Technology Co., Tencent Holdings Ltd. and other cybersecurity firms have begun making protection tools available, the internet overseer said.

China National Petroleum Corp., which owns PetroChina, reported that some of its 21,000 gas stations had seen their digital payment systems disabled by the attack and resorted to accepting cash. More than 80 percent of the stations had been reconnected to the network as of noon on May 14, the company said. Several Chinese universities had also been hit by the attacks, according to local media reports.

In Japan, Hitachi Ltd. said that some of its computers had been affected. In South Korea, CJ CGV Co., the country’s largest cinema chain, said advertising servers and displays at film theaters were hit by ransomware. Movie servers weren’t affected and are running as normal, it said in a text message Monday. Indonesia’s government reported two hospitals in Jakarta were affected.

While any size company could be vulnerable, many large organizations with robust security departments would have prioritized the update that Microsoft released in March and wouldn’t be vulnerable to Friday’s attack.

Users Tricked

Ransomware is a particularly stubborn problem because victims are often tricked into allowing the malicious software to run on their computers, and the encryption happens too fast for security software to catch it. Some security experts calculate that ransomware may bring in as much as $1 billion a year in revenue for the attackers.

The attack was apparently halted in the afternoon in the U.K. when a researcher took control of an Internet domain that acted as a kill switch for the worm’s propagation, according to Ars Technica.

“I will confess that I was unaware registering the domain would stop the malware until after I registered it, so initially it was accidental,” wrote the researcher, who uses the Twitter name @MalwareTechBlog. “So long as the domain isn’t revoked, this particular strain will no longer cause harm, but patch your systems ASAP as they will try again.”

A second variant of the domain also became apparent. Suiche, founder of Comae Technologies, said on Sunday he registered another kill-switch for a different version of the ransomware. About 50% of machines that would have spread the infection by the second variation of the malware have Russian I.P. addresses, according to Suiche.

There is a high probability that Russian-language cybercriminals were behind the attack, said Aleks Gostev, chief cybersecurity expert for Kaspersky Labs.

“Ransomware is traditionally their topic,” he said. “The geography of attacks that hit post-Soviet Union most also suggests that.”

Is the CEO/Founder of Investors King Limited. A proven foreign exchange research analyst and a published author on Yahoo Finance, Businessinsider, Nasdaq, Entrepreneur.com, Investorplace, and many more. He has over two decades of experience in global financial markets.

Continue Reading
Comments

Crude Oil

Oil Prices Continue to Slide: Drops Over 1% Amid Surging U.S. Stockpiles

Published

on

Crude Oil

Amidst growing concerns over surging U.S. stockpiles and indications of static output policies from major oil-producing nations, oil prices declined for a second consecutive day by 1% on Wednesday.

Brent crude oil, against which the Nigerian oil price is measured, shed 97 cents or 1.12% to $85.28 per barrel.

Similarly, U.S. West Texas Intermediate (WTI) crude slumped by 93 cents or a 1.14% fall to close at $80.69.

The recent downtrend in oil prices comes after they reached their highest level since October last week.

However, ongoing concerns regarding burgeoning U.S. crude inventories and uncertainties surrounding potential inaction by the OPEC+ group in their forthcoming technical meeting have exacerbated the downward momentum.

Market analysts attribute the decline to expectations of minimal adjustments to oil output policies by the Organization of the Petroleum Exporting Countries (OPEC) and its allies, known collectively as OPEC+, until a full ministerial meeting scheduled for June.

In addition to concerns about excess supply, the market’s attention is also focused on the impending release of official government data on U.S. crude inventories, scheduled for Wednesday at 10:30 a.m. EDT (1430 GMT).

Analysts are keenly observing OPEC members for any signals of deviation from their production quotas, suggesting further volatility may lie ahead in the oil market.

Continue Reading

Energy

Nigeria Targets $5bn Investments in Oil and Gas Sector, Says Government

Published

on

Crude Oil - Investors King

Nigeria is setting its sights on attracting $5 billion worth of investments in its oil and gas sector, according to statements made by government officials during an oil and gas sector retreat in Abuja.

During the retreat organized by the Federal Ministry of Petroleum Resources, Minister of State for Petroleum Resources (Oil), Heineken Lokpobiri, explained the importance of ramping up crude oil production and creating an environment conducive to attracting investments.

He highlighted the need to work closely with agencies like the Nigerian National Petroleum Company Limited (NNPCL) to achieve these goals.

Lokpobiri acknowledged the challenges posed by issues such as insecurity and pipeline vandalism but expressed confidence in the government’s ability to tackle them effectively.

He stressed the necessity of a globally competitive regulatory framework to encourage investment in the sector.

The minister’s remarks were echoed by Mele Kyari, the Group Chief Executive Officer of NNPCL, who spoke at the 2024 Strategic Women in Energy, Oil, and Gas Leadership Summit.

Kyari stressed the critical role of energy in driving economic growth and development and explained that Nigeria still faces challenges in providing stable electricity to its citizens.

Kyari outlined NNPCL’s vision for the future, which includes increasing crude oil production, expanding refining capacity, and growing the company’s retail network.

He highlighted the importance of leveraging Nigeria’s vast gas resources and optimizing dividend payouts to shareholders.

Overall, the government’s commitment to attracting $5 billion in investments reflects its determination to revitalize the oil and gas sector and drive economic growth in Nigeria.

Continue Reading

Commodities

Palm Oil Rebounds on Upbeat Malaysian Exports Amid Indonesian Supply Concerns

Published

on

Palm Oil - Investors King

Palm oil prices rebounded from a two-day decline on reports that Malaysian exports will be robust this month despite concerns over potential supply disruptions from Indonesia, the world’s largest palm oil exporter.

The market saw a significant surge as Malaysian export figures for the current month painted a promising picture.

Senior trader David Ng from IcebergX Sdn. in Kuala Lumpur attributed the morning’s gains to Malaysia’s strong export performance, with shipments climbing by a notable 14% during March 1-25 compared to the previous month.

Increased demand from key regions like Africa, India, and the Middle East contributed to this impressive growth, as reported by Intertek Testing Services.

However, amidst this positivity, investors are closely monitoring developments in Indonesia. The Indonesian government’s contemplation of revising its domestic market obligation policy, potentially linking it to production rather than exports, has stirred market concerns.

Edy Priyono, a deputy at the presidential staff office in Jakarta, indicated that this proposed shift aims to mitigate vulnerability to fluctuations in export demand.

Yet, it could potentially constrain supply availability from Indonesia in the future to stabilize domestic prices.

This uncertainty surrounding Indonesian policies has added a layer of complexity to palm oil market dynamics, prompting investors to react cautiously despite Malaysia’s promising export performance.

The prospect of Indonesian supply disruptions underscores the delicacy of global palm oil supply chains and their susceptibility to geopolitical and regulatory factors.

As the market navigates these developments, stakeholders remain attentive to both export data from Malaysia and policy shifts in Indonesia, recognizing their significant impact on palm oil prices and market stability.

Continue Reading
Advertisement




Advertisement
Advertisement
Advertisement

Trending