Megafon: A spokesperson for Russian telecommunications company Megafon told CNN that the cyberattack affected call centers but not the company's networks.
A malicious piece of software that blocks access to computers until money is paid, ransomware WannaCry is said to have swamped machines in over 150 countries, including India. People are anxious a second wave of cyberattacks could strike around the world on Monday as employees return to their desks and log onto their computers. And while other attackers might use the same flaw, such attacks will be steadily less successful as organizations patch it. "We can surely expect more".
The threat was "escalating" as cyber experts warned that another attack was imminent in coming days, he said.
Who was behind the attack? Linux and MacOS users have remained unaffected so far.
Wilson spoke as hospitals in the United Kingdom were beginning to get back to normal, although some were still experiencing problems after the global attack which hit 48 National Health Service trusts in England and 13 Scottish health boards, according to Sky News.
Nissan: The carmaker said in a statement that "some Nissan entities were recently targeted" but "there has been no major impact on our business". "It's particularly galling because this attack potentially endangered the lives of many".
However, MalwareTech added, the kill switch that was activated doesn't prevent the actors responsible for the ransomware from removing the domain check in their code and re-launching an attack, "so it's incredibly important that any unpatched systems are patched as quickly as possible".
In New Zealand, the Government Communications Security Bureau said it had not received any reports of the malware infection.
It says the latest virus exploits a flaw in Microsoft Windows identified by, and stolen from, U.S. intelligence.
Security experts warn there is no guarantee that access will be granted after payment.
"But I don't think we can say it hasn't impacted this region to the extent it has some other regions". "But what about any new variants that will come in the future?"
In less than two days ransomware derived from leaked NSA exploits has spread across the globe to infect hundreds of thousands of PCs at critical operations like hospitals, schools and telcos.
Mikko Hypponen, chief research officer at the Helsinki-based cybersecurity company F-Secure, said ransomware attacks like WannaCry are "not going to be the norm". "This is probably version 2.1, and it has the potential to be much more effective - assuming security defenders haven't spent all weekend patching", he said.
WannaCry takes advantage of a vulnerability in Microsoft Windows.
Microsoft said it had taken the "highly unusual step" of releasing a patch for computers running older operating systems including Windows XP, Windows 8 and Windows Server 2003.
Cyber Security Minister Dan Tehan declared three Australian businesses were affected by the unprecedented ransomware attack.
The attacks used ransomware that apparently exploited a security flaw in Microsoft operating systems, locking users' files unless they pay the attackers a designated sum in the virtual currency Bitcoin.
Microsoft's lawyer says governments should "report vulnerabilities" that they discover to software companies, "rather than stockpile, sell, or exploit them".
Governments around the world were bracing themselves for the start of the workweek.
The exact data about the systems hit by the ransomware, however, will be known once the offices open on Monday, the official said.style="text-align: center;"