The ransomware attack has affected more than 200,000 victims in 150 countries, said Rob Wainwright, head of law enforcement agency Europol. The Spanish government said several companies including Telefonica had been targeted in ransomware cyberattack that affected the.
There are fears of further "ransomware" attacks as people return to work on Monday. A total of 61 NHS organisations, ranging from hospitals to GP surgeries, are now known to have fallen victim to WannaCry ransomware. A top Russian mobile operator said Friday it had come under cyberattacks that appeared similar to those that have crippled some United Kingdom ho. Fedex said it had experienced "interference with some of our Windows-based systems caused by malware".
The Windows vulnerability in question was purportedly identified by the NSA for its own intelligence-gathering purposes.
The Japan Computer Emergency Response Team Coordination Center, a nonprofit group, said 2,000 computers at 600 locations in Japan were affected.
"The WannaCrypt exploits used in the attack were drawn from the exploits stolen from the National Security Agency", Microsoft President and Chief Legal Officer Brad Smith says.
Russian Federation said its banking system was among the victims of the attacks, along with the railway system, although it added that no problems were detected.
At least one strain of the ransomware has proven especially vicious.
Organizations around the world spent the weekend trying to recover after being hit by a virus that seeks to seize control of computers until victims pay a ransom.
In the world of ransomware, that was "unheard of six months ago", Levy said.
There was a two-fold increase in attempted attacks against IoT devices over the course of 2016 and, at times of peak activity, the average device was attacked once every two minutes.
Had it not been for a young cybersecurity researcher's accidental discovery of a so-called "kill switch", the malicious software likely would have spread much farther and faster.
In the US, where the effects haven't appeared to be widespread, investigators believe additional companies have been attacked but have not yet come forward to report it, a law enforcement official told The Associated Press. The tools appeared stolen by hackers, who dumped them on the internet.
"It's good hygiene for information security and this is a ideal example this week of not enough of us are doing that on a regular basis", said Legary, who helped create innovation alley in Winnipeg and now works with the city.
The ministry advised employees to turn Wi-Fi routers off and disconnect LAN cables before starting their computers and move all important data to external storage or another computer equipped with the Linux or Mac OS system.
"Staff have been working tirelessly over the weekend, using tried and tested processes to keep patients safe and well cared for", the hospital said in a statement.
Smith also called cyberattack protection a "shared responsibility" between companies and customers.
Thousands more infections were reported with the start of the workweek, largely in Asia, which had been closed for business when the "ransomware" locked up computers Friday at hospitals, factories, government agencies, banks and other businesses.
Sixteen National Health Service organizations in the United Kingdom were hit, and some of those hospitals canceled outpatient appointments and told people to avoid emergency departments if possible.
A divert remained in place for trauma, stroke and urgent heart attack treatment, where diagnostic services are required, at the Lister Hospital, part of East and North Hertfordshire NHS Trust (Midlands & East). However, it is understood that a few systems of the police department in Andhra Pradesh were impacted.
"There are so many states that have been affected". "Our cybercrime teams are now working to retrieve lost data", Joshua said.
Editor's note: The email from Judson Althoff was added to this story. Have you paid the ransom?