Microsoft Ransomware Patch: Installing Updates Can Stop Cyberattack

Telefónica: Spanish authorities confirmed the Spanish telecom company Telefónica was one of the targets, though the attack affected only some computers and did not compromise the security of clients' information.

However, the global media suggest that there were few fresh attacks in parts of Asia and Europe on the day. The hack attack went global quickly by exploiting the hacking tools engineered by the U.S. spy agency, NSA.

Microsoft issued a list of a number of Windows software that is vulnerable to WannaCry ransomware. However, a 22-year-old United Kingdom security researcher - who goes by the online name "MalwareTech" - discovered a "kill switch" in the software's code, according to BBC. "It is deeply disturbing the National Security Agency likely wrote the original malware".

"We haven't seen a second spike in #WannaCry #ransomware attacks, but that doesn't mean there won't be one", the NCA said in a tweet.

Russian Federation was the hardest hit country followed by Ukraine and India.

Hundreds of thousands of computers have been affected so far.

Why is India vulnerable to ransomware attack?

"We're trawling through huge amounts of data associated with the attack and identifying patterns", said Lynne Owens, Director General of the National Crime Agency, the UK's organised crime fighting taskforce.

Meanwhile, petrol stations in the western city of Chongqing were unable to accept card payments after systems at China National Petroleum Corp became infected, the South China Morning Post reported.

As the malware was expected to encrypt the hardware disk of a computer before spreading to other systems on local area network (LAN), the banks were asked to install the latest patch of anti-virus.

They are now being forced to pay $300 (£230) to continue working on end-of-year projects due to be handed in soon, our correspondent says.

NHS Digital said in a statement: "The investigation is at an early stage, but we believe the malware variant is Wanna Decryptor", a spokesperson said. It is the most high-profile cyber-attack.

They exploited a ideal storm of factors - the Windows hole, the ability to get ransom paid in digital currency, poor security practices - but it's unclear if the payoff, at least so far, was worth the trouble. Bloomberg saysthat the hackers have made as much as $50,000 from the ransomware.

Furthermore, credentials of 20,000 GCC employees were compromised and leaked online previous year. Though it didn't have any significant impact in India, but the cyber security experts are working round the clock from last two days to protect the corporate clients.

"This is an emerging pattern in 2017".

"We have seen vulnerabilities stored by the Central Intelligence Agency show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world", wrote Smith.

Then there's the US government, whose Windows hacking tools were leaked to the internet and got into the hands of cybercriminals. He says that when the NSA lost control of the software behind the cyberattack, it was like "the USA military having some of its Tomahawk missiles stolen".

In the blog post, the group said it was setting up a "monthly data dump" and that it could offer tools to break into web browsers, network routers, phone handsets, plus newer exploits for Windows 10 and data stolen from central banks.

It also said it was time for an urgent collective action and called on tech sector, customers, and governments to work together to protect against cyber-attacks.