伦敦某肿瘤医院一位不具名的医生在网上写道:
'Everything has gone down. No blood results, no radiology images, there's no group specific blood available.
“所有电脑都故障了。看不到血检结果、放射光片,也没有具体血型的血浆可用。”
'They've declared an internal major incident, the hospital is diverting major trauma and stroke patients. All elective surgery was cancelled from about 1pm. We're not doing anything in theatre that's not life or limb threatening.'
“他们已经宣布这是一起重大内部事件,医院正在转移重大创伤和中风病人。下午1点左右起,所有非急需施行的手术都被取消了。我们不给任何没有生命或肢体威胁的患者做手术。”
'I was about to have the operation but then the doctors came round this morning and said all the computers are down because of all the hacking and the procedure can't be done because they can't access my records.
“我正准备做手术,但是今天早上医生来了,他们告诉我因为黑客入侵,所有的电脑都瘫痪了,由于他们无法获取我的病例,所以不能进行手术。”
'There are so many corporations out there they could be getting money from, but to do it to the NHS that does so much good for people, it's just disgusting.'
“他们可以从外面的很多公司捞一笔,但却针对治病救人的NHS,真是太恶心了。”
据统计,英国有近40家医疗机构遭到该病毒的攻击。
(, 下载次数: 47)
上传
点击文件名下载附件
这么厉害的病毒哪里来的?
根据科技网站Wired的解释,这次的勒索程序是今年3月底出现过的一种勒索程序的最新变种。而CNN称,“据信这种黑客工具来源于美国国家安全局”(The hacking tool is believed to belong to the NSA)。
Russian Central Bank: State media agency Tass reported the bank discovered malware bulk emails to banks but detected no compromise of resources.
俄罗斯中央银行:俄罗斯国家媒体塔斯社报道称,银行收到了携带恶意软件的群发电子邮件,但是没有发现数据资料受损。
Russian Railways: State media said a virus attacked the IT system of Russian Railways, but it did not affect operations due to a prompt response. The company said the virus has been localized and "technical work is underway to destroy it and update the antivirus protection."
俄罗斯铁路:塔斯社称,俄罗斯铁路的电脑系统遭到了病毒攻击,但是由于反应迅速,铁路运营没有受到影响。该公司表示,病毒已被控制,他们正“采取技术措施,清除病毒并更新杀毒防护系统。”
Interior Ministry: The Russian Interior Ministry acknowledged a ransomware attack on its computers, adding that less than 1% of computers were affected. The statement said antivirus systems are working to destroy it.
俄罗斯内政部:俄罗斯内政部承认其电脑遭到了勒索程序攻击,不到1%的电脑受到了影响。内政部声称,杀毒系统正在努力清除病毒。
Megafon: A spokesperson for Russian telecommunications company Megafon told CNN that the cyberattack affected call centers but not the company's networks. He said the situation was under control.
俄罗斯第二大移动运营商Megafon:俄罗斯电信公司Megafon的发言人告诉CNN,其客服中心受到此次网络攻击的影响,但是公司的网络未受波及。他称,形势尽在掌控之中。
据BBC报道:
The researcher first noticed that the malware was trying to contact a specific web address every time it infected a new computer.
这位研究员率先注意到这款病毒每次感染一台新的电脑时都试图访问一个特定的域名。
But the web address it was trying to contact had not been registered.
但是这个域名并没有被注册。
MalwareTech decided to register it, and bought it for $10.69. Owning it would let him see where computers were accessing it from, and give him an idea of how widespread the ransomware was.
MalwareTech花10.69美元(约合人民币74元)注册了这个域名。购买域名后,他就可以看到这个域名都接到哪里的电脑,从而了解勒索程序的扩散程度。
By doing so, he unexpectedly triggered part of the ransomware's code that told it to stop spreading.
但令他没有料到的是,这种做法激活了该勒索程序内终止传播的代码。
This type of code is known as a "kill switch", which some attackers use to halt the spread of their software if things get out of hand.
这种代码被称为“自杀开关”,有些黑客为了防止事态失控将其作为一个停止病毒扩散的开关。