Skip to main content

Govt issues critical alert over ransomware threat


No major incident yet in the country, but central bank, stock exchanges, other vital institutions told to bolster defences; companies rush to protect computer systems.The government’s cybersecurity arm has asked the central bank, stock exchanges, the National Payments Corp. of India (NPCI) and other vital institutions to safeguard their systems against the latest cyberattack that has infected thousands of systems globally and may escalate further.

The Indian Computer Emergency Response Team (CERT-In), the central agency coordinating efforts on cyber security issues, has issued a “critical alert” and has advised the installation of relevant “patches” to protect against any data breaches.

The virus dubbed Wanna Cry, a so-called ransomware, has locked up more than 100,000 computers and sent cybersecurity experts scrambling on Sunday to patch computers and restore infected ones. Experts fear that the ransomware worm that stopped car factories, hospitals, shops and schools in more than 100 countries could wreak fresh havoc on Monday when employees log back on.

Indian officials, who declined to be named, said no major incident of cyberattack has been brought to the notice of CERT-In yet.

Even so, information security officers and senior executives in charge of running the information technology operations in Indian enterprises have been rushing to protect their computer systems against the attack.

Security experts in the country said that the full extent of damage to systems in India would become known when employees log into their systems on Monday morning.

“The number of systems being patched (which means a security plug-in is applied to prevent a loophole in software being exploited) in the past 48 to 72 hours in India is unprecedented,” said Burgess Cooper, partner, cybersecurity, at advisory and consulting firm EY India. He said some manufacturing and consumer goods companies in India may be impacted, though there were no confirmed reports at the time of going to press.

A ransomware typically logs users out of their own systems through forced encryption of data and asks them to pay a ransom (in the case of WannaCry, the ransom was demanded in bitcoin, a crypto-currency) if they want to access the encrypted data.

The country most affected by WannaCry is said to be the UK, where 48 of the 248 National Health Service trusts were impacted, causing widespread disruption to health services in the country.

Renault on Saturday said it had halted manufacturing at plants in Sandouville, France and Romania to prevent the spread of ransomware in its systems.Among the other victims is a Nissan car plant in Sunderland, northeast England.

The WannaCry malware, according to CERT-In, spreads “by using a vulnerability in implementations of Server Message Block” in systems running Microsoft’s Windows  operating system.

Microsoft released patches last month and on Friday to fix the vulnerability that allowed the worm to spread across networks, a rare and powerful feature that caused infections to surge on Friday.

Code for exploiting that bug, which is known as “Eternal Blue”, was released on the internet in March by a hacking group known as the Shadow Brokers.The group claimed it was stolen from a repository of the US National Security Agency (NSA)’s hacking tools. The agency has not responded to requests for comment.

Though the spread of the virus has slowed, cybersecurity experts warned that the respite may be brief as new versions of the worm were expected.The control of the situation has been attributed to a 22-year-old UK researcher who went by the name of MalwareTech.

According to a report on Forbes.com, the researcher is said to have noted that one of the web domains used by the attackers hadn’t been registered. So he registered  the site, took control of the domain for $10.69 and started seeing connections from infected victims, which enabled him to track the ransomware’s spread. This accidentally stopped the malware—at least in the UK.

Mint New Delhi, 15th May 2017

Comments

Popular posts from this blog

New income tax slab and rates for new tax regime FY 2023-24 (AY 2024-25) announced in Budget 2023

  Basic exemption limit has been hiked to Rs.3 lakh from Rs 2.5 currently under the new income tax regime in Budget 2023. Further, the income tax slabs in the new tax regime has been changed. According to the announcement, 5 income tax slabs will be there in FY 2023-24, from 6 income tax slabs currently. A rebate under Section 87A has been enhanced under the new tax regime; from the current income level of Rs.5 lakh to Rs.7 lakh. Thus, individuals opting for the new income tax regime and having an income up to Rs.7 lakh will not pay any taxes   The income tax slabs under the new income tax regime will now be as follows: Rs 0 to Rs 3 lakh - 0% tax rate Rs 3 lakh to 6 lakh - 5% Rs 6 lakh to 9 lakh - 10% Rs 9 lakh to Rs 12 lakh - 15% Rs 12 lakh to Rs 15 lakh - 20% Above Rs 15 lakh - 30%   The revised Income tax slabs under new tax regime for FY 2023-24 (AY 2024-25)   Income tax slabs under new tax regime Income tax rates under new tax regime O to Rs 3 lakh 0 Rs 3 lakh to Rs 6 lakh 5% Rs 6

Jaitley plans to cut MSME tax rate to 25%

Income tax for companies with annual turnover up to ?50 crore has been reduced to 25% from 30% in order to make Micro, Small and Medium Enterprises (MSME) companies more viable and also to encourage firms to migrate to a company format. This move will benefit 96% or 6.67 lakh of the 6.94 lakh companies filing returns of lower taxation and make MSME sector more competitive as compared with large companies. However, bigger firms have shown their disappointment since the proposal for reducing tax rates was to make Indian firms competitive globally and it is the large firms that are competing globally. The Finance Minister foregone revenue estimate of Rs 7,200 crore per annum for this for this measure. Besides, the Finance Minister refrained from removing or reducing Minimum Alternate Tax (MAT), a popular demand from India Inc., but provided a higher period of 15 years for carry forward of future credit claims, instead of the existing 10-year period. “It is not practical to rem

Don't forget to verify your income tax return in August: Here's the process

  An ITR return needs to be verified within 120 days of filing of tax return. Now that you have filed your income tax return, remember to verify it because your return filing process is not complete unless you do so. The CBDT has reduced the time limit of ITR verification to 30 days (from 120 days) from the date of return submission. The new rule is applicable for the returns filed online on or after 1st August 2022. E-verification is the most convenient and instant method for verifying your ITR. However, if you prefer not to e-verify, you have the option to verify it by sending a physical copy of the ITR-V. Taxpayers who filed returns by July 31, 2023 but forget to verify their tax returns, will get the following email from the tax department, as per ClearTax. If your ITR is not verified within 30 days of e-filing, it will be considered invalid, and may be liable to pay a Late Fee. Aadhaar OTP | EVC through bank account | EVC through Demat account | Sending duly signed ITR-V through s