Security sources said they were working with Marcus Hutchins, who uses the name Malware Tech, and others to try to stop the spread of the WannaCry ransomware attack.
"The infection of one computer triggers rather remotely the infection of entire networks", Wainwright said. And those running the company's 15-year-old Windows XP software were left unprotected, because Microsoft stopped issuing patches for XP in 2014. An unknown group worldwide targeting the vulnerabilities in the Microsoft windows operating system launched a ransomware known as WanaCrypt0r 2.0, WannaCry and WCry.
Dore said: "Using outdated versions of Windows that are no longer supported raises a lot of questions". What's this about the NSA?
"This [attack] is an urgent call for collective action", said Bossert. There's Microsoft, whose ubiquitous Windows operating systems were compromised after attackers exploited a security hole. And while Microsoft said it had already released a security update to patch the vulnerability one month earlier, the sequence of events fed speculation that the NSA hadn't told the US tech giant about the security risk until after it had been stolen.
The attack, known as "WannaCry" had a key influence across Asia with Chinese state media saying nearly 30,000 institutions had been infected. Cybercriminals behind the scam are typically demanding $300 in Bitcoin to unlock a company's computers.
In Asia, where many offices closed before the WannaCry ransomware struck on Friday, the attack has been less severe than expected.
The hackers are called Shadow brokers.
"Ransomware in particular relies on locking up files, so our advice to organisations if you have a reliable backup, this is less of an issue - noting the malware needs to be neutralised first".
Security experts also warn WannaCry might strike again through new, updated variants. Already, new variants of the rapidly replicating worm were discovered on Sunday which did not include the so-called kill switch. "This one, we knew it could be a problem", the official told Reuters. So, is the threat over?
Once the computer's data has been encrypted, or locked down, a message would appear saying that the users' files are no longer accessible. Meanwhile, a security researcher in the United Kingdom discovered a "kill switch" in WannaCry, further mitigating its impact. According to ProofPoint, the main motive for ransomware is profit.
However, Mikko Hypponen, chief research officer at security vendor F-Secure, tweeted on Monday that some victims who paid did get their files back. There are also other theories.
The cyber attack has been deemed as the biggest in history even as IT specialists suggest that the cyber criminals responsible have not made much monetary benefits.
"The operating systems on our computers and software downloads are managed centrally so that regular users can not download executable files from the internet without administrative rights", he said in an email.style="text-align: center;"