The majority of computers affected by this massive cyber-attack were running on Windows 7.
Microsoft’s Windows 7 seems to have been the worst affected by the recent cyber-attack with WannaCry malware, Internet security experts say.
Specifically, according to estimates by large cyber-security companies such as Kaspersky Lab and BitSight, the majority of computers affected by this massive cyber-attack have been running on Windows 7.
WannaCry made its appearance in mid-May and spread in record time, and has so far affected at least 200,000 computers around the world. According to Kaspersky data, Windows 7 is the operating system widely used by large organizations, but they did not install the security update that Microsoft released in March to protect systems from such threats. Spanish telecommunications operator Telefonica, French automaker Renault, German railway company Deutsche Bahn, Fedex logistics company, Russian interior ministry, and 61 healthcare providers in the UK were among those who suffered the consequences of ransomware.
The spread was rapid, with cyber-security experts saying that it was one of the biggest cyber-attacks in the history of the Internet.
Whenever WannaCry managed to get into a system, it locked the computer files by requiring an ransom to re-grant access to the user. According to a BBC news, criminals demanded payment of $ 300 to bitcoin, the virtual currency. So far, a total of $ 99,448 has been paid out of 296 cases. However, so far, there are no reports of whether the criminals have unlocked the files of those users who have chosen to pay the money.
A fact that security experts have discovered and worth noting is that the virus was spreading at a spectacular speed because it was looking “on its own” to find vulnerable systems on the Internet.
So far, many have believed that it all started with an e-mail based e-mail campaign. Malwarebytes cyber-security expert Adam McNeil told the BBC that malware was designed to look for systems vulnerable to a vulnerability in Microsoft technology, known as Server Message Block.
“The attackers started a business to find vulnerable SMB ports and as soon as they were doing, they were using new programs to spread malware to as many vulnerable systems were connected to networks.” He suspected that anyone behind this attack had initially identified “a few thousand” vulnerable systems, which were used as a platform to launch a larger wave of attacks.