Bank officials were asked not open any mails from unidentified sources.They were also asked to exercise caution in opening attachments or URL links sent in mails.
When Microsoft sells software it does so through a licensing agreement that states the company is not liable for any security breaches, said Michael Scott, a professor at Southwestern Law School.
The FBI has advised a multi-pronged approach to battling hackers including implementing software restriction policies, backing up data regularly, patching operating systems and restricting access to certain key files or directories.
That's how most ransomware finds its way onto victims' computers. He went on calling the WannaCry attack a "wakeup call".
Cyber-security firm Avast reportedly said it had seen 75,000 cases of the ransomware around the world.
Security experts have speculated that the ransomware, which works by exploiting a vulnerability in older versions of Windows, came from a cache of hacking tools allegedly stolen from the NSA by hacker group Shadow Brokers.
But the puzzle is how the first person in each network was infected with the worm. "The worst but it could still witness fresh havoc today", Budiman Tsjin, Senior Technical Consultant, Asia, RSA said. "At that point, it will be harder to stop new variants". "How the hell did this get on there, and could this be repeatedly used again?" said Barlow. The ministry said the technicians had contained the attack.
But the company agrees that the malware relied less on phishing e-mails than other attacks.
A huge problem was that businesses did not want to admit that they were being held ransom by such attacks.
With WannaCry plaguing systems across the globe for the past few days, it's about time that you learn what precautions to take to avoid falling prey to ransomware.
The updated ransomware demands 0.11943 bitcoin (around $218) as the payment for unlocking one system. In the past, this has included hot lines in various languages.
Hundreds of ATMs across India's tech hub remained shut for the second day due to possible virus attack by WannaCry ransomware and cash crunch, said a bank official on Tuesday. He also noted that the action appeared to be criminal in nature since the hackers are demanding money from those whose computers were infected by WannaCry ransomware.
The organisation also confirmed that it was safe to connect to the service's internal email system, NHSmail, after work was completed by experts to ensure servers were ready to use.
The warning was echoed by Britain's National Cyber Security Centre: "As a new working week begins it is likely, in the United Kingdom and elsewhere, that further cases of ransomware may come to light, possibly at a significant scale".