He noted that Europol is working with the Federal Bureau of Investigation to try and discover the people behind the attack.
French police said there were "more than 75,000 victims" around the globe, but cautioned that the number could increase "significantly".
"WannaCry" encrypts files with the following extensions, appending.WCRY to the end of the file name like.lay6, .sqlite3, .sqlitedb, .accdb, .java and.docx among others. In most cases, the only way to regain control of data is to buy the decryption keys from the attackers-unless you have backups, of course.
The attack impacted on hospital sites in Lanarkshire, as well as GP surgeries, dental practices and other primary care centres around the country.
XP is more vulnerable to malware than later operating systems as it is no longer supported.
Lord Paddick, Liberal Democrat home affairs spokesman, said: "We need to get to the bottom of why the Government thought cyber attacks were not a risk, when a combination of warnings and plain common sense should have told ministers that there is a growing and risky threat to our cyber security".
The majority of the attacks targeted Russia, Ukraine and Taiwan.
So how can people and organizations protect themselves against such attacks? Both said Russian Federation was hit hardest.
It said Britain's electronic surveillance agency was "in charge of hacking us and protecting us from hackers", making it hard to balance the risks of keeping vulnerabilities secret.
British cybersecurity expert Graham Cluley doesn't want to blame the NSA for the attack. Following the alert, the Gujarat government began equipping its state computer systems with anti-virus softwares and upgrading its Microsoft operating systems. The fact is the NHS has fallen victim to this.
"However, we must remain particularly vigilant against further incidents and the Scottish government is taking action to enhance security, including contacting over 120 public bodies to ensure they have appropriate defences in place".
The worldwide effort to extort cash from computer users is the first widely successful example of ransomware that self-replicates like a virus, and it prompted Microsoft to quickly change its policy, announcing free security patches to fix this vulnerability in the older Windows systems still used by millions of individuals and smaller businesses.
Therefore, the victims are as much to blame for their troubles as anyone else. National Security Agency for its own intelligence-gathering purposes and was later leaked to the internet.
Cyber security experts have warned that the ransomware virus, that affected one in five NHS Trusts last week, could be reactivated by computers and devices that have not yet been switched on. The malware attempts "to connect to the domain we registered and if the connection is not successful it ransoms the system, if it is successful the malware exits", MalwareTech wrote.
Marin Ivezic, cyber security partner at PwC, said some clients had been "working around the clock since the story broke" to restore systems and install software updates or restore systems from back-ups.
But MalwareTech said sinkholing would only stop the spread until hackers removed the domain check and tried again. Don't expect cybercriminals to abandon the profitable and practical business model that ransomware provides. The malware spreads through e-mail.
Ben Dickson is a software engineer and the founder of TechTalks.