This means that it gets into your computer and looks for other computers to try and spread itself as far and wide as possible. That prompted the company to issue another patch on Friday for older and unsupported operating systems such as Windows XP, allowing users to secure their systems without requiring an upgrade to the latest operating software.
The Computer Emergency Response Team of India (CERT-In) has issued a red alert about the ransomeware. He reminded people to update software, pointing out that Microsoft had released a patch for the WannaCry vulnerability in March.
To defend computer running on Windows XP, Windows Server 2003 and Windows 8 against ransomware, downloading the new patch from Windows.
"The first step to do is to not open any attachment with the extension '.exe' or '.js' since prevention is better than cure".
"Intelligence agencies will always be developing zero-days, but unlike traditional weapons, these tools can be repurposed quickly from devastating criminal attacks", said Bambenek in an email statement.
The China Daily said Wednesday that the U.S.'s National Security Agency should take some of the blame for last week's WannaCry ransomware attack, which targeted vulnerabilities in Microsoft systems and affected 30,000 Chinese organizations alone.
As this ongoing outbreak is affecting countless computer users around the world, Bitdefender is actively working on a free decryption tool to help victims recover their information without paying the ransom.
Backing up data, Symantec adds, "is the single most effect way of combating ransomware infection".
It's yet another example of how important it is to update software.
But Scott Vernick, a data security lawyer at Fox Rothschild that represents companies, said he was skeptical that WannaCry would produce a flood of consumer lawsuits.
It encrypted victim's files and changed the extensions to:.wnry, .wcry, .wncry and.wncrypt.
Experts are suspecting that the next wave of attacks will be subjected to the banking sector."Our banks may be affected in a couple of hours".
Mac or Linux users are at the moment safe from harm, but there remains a risk they could be infected via the intranet once a member computer is infected.
Larry Magid, a technology journalist and CEO of ConnectSafely.org, said: "There is some speculation that this code was being stored in the NSA labs, potentially as a cyber weapon that the United States might have used against its own adversaries".
Europol said on Monday it was continuing to hunt for the culprits behind the unprecedented attack.