When your technology breaks down, it can make you want to cry, especially when you haven't saved the files you need to a flash drive or external hard drive-rendering your work obsolete.
When your files and data are lost to you because a cybercriminal saw their chance to lockdown and steal your data, your cry will most likely break into a moaning wail. What's worse is when a cybercriminal gets into your server and shuts it down using stolen spy tools, rendering your IT guy helpless.
Affecting over 150 countries and counting, WannaCry, a new form of ransomware has infected computers all over the world. So far, the hackers using the NSA stolen or leaked spy tools are demanding a $300 ransom for the release of the controlled files. So far, the global cyberattack has derailed train stations and put hospitals in crisis mode.
Looking at the large-stretched reach the cybercriminal who disseminated the cyberattack has, it's highly recommended that if you don't already have cyberattack insurance, you need to sign up for a plan ASAP. Cyberattack insurance provides a financial buffer between your company's finances and the reparations that'll be required to make in the aftermath of a data breach.
Still not concerned about the biggest data breach (it's even bigger than the Dyn attack in October 2016) in modern times? Here's a bit more information on how the cybercriminal used NSA secrets to wreak irreparable tech damage across the world.
WannaCry: How Vulnerabilities Can Bring Tech Down
Back in April it was reported that a cache of NSA spy tools had been leaked by a cyber collective named the Shadow Brokers. As reported by Tech Crunch, "the files contain[ed] tools apparently designed to access Windows machines, as well as slideshows documenting the targeting of banking systems." This isn't the first time the Shadow Brokers have published government secrets online. In summer 2016, the hacking collective shared a number of NSA hacking tools.
Taking it upon themselves to let the public know what the NSA is doing behind closed doors, by sharing these secrets, the cyber ring is putting innocent lives in danger and helping to put SMBs asunder. The new ransomware uses a vulnerability in Microsoft's Windows operating system, and Microsoft blames the U.S. government for developing hacking tools to exploit this vulnerability. As of the writing of this article, the U.S. is unscathed by the worldwide cyberattack, leaving people to question who is really responsible-the Shadow Brokers or the U.S. government?
Though it was initially believed that the Kremlin was behind this new cyberattack, Vladimir Putin denies Kremlin involvement. "Malware created by intelligence agencies can backfire on its creators." Speaking to news media in Beijing, Putin added that "global leaders need to discuss cybersecurity at a 'serious political level' and said that U.S. has backed away from signing a cybersecurity agreement with Russia. Given that intelligence officials have learned that the Kremlin (with the blessing of the Russian president) conducted cyberattacks on the U.S. presidential election and is continuing to do so with other democratic European nations, it's hard to imagine that either have reached across the aisle to discuss cybersecurity.
Don't wait until your office is infected with ransomware to act. Get your cyberattack insurance with CyberPolicy today.