<?xml version="1.0" encoding="UTF-8"?><feed
	xmlns="http://www.w3.org/2005/Atom"
	xmlns:thr="http://purl.org/syndication/thread/1.0"
	xml:lang="en-US"
	>
	<title type="text">WannaCry Ransomware: all the updates on the cyberattack &#8211; The Verge</title>
	<subtitle type="text">The Verge is about technology and how it makes us feel. Founded in 2011, we offer our audience everything from breaking news to reviews to award-winning features and investigations, on our site, in video, and in podcasts.</subtitle>

	<updated>2017-12-19T01:14:54+00:00</updated>

	<link rel="alternate" type="text/html" href="https://www.theverge.com/2017/5/14/15638026/wannacry-ransomware-updates-cyberattack-cybersecurity" />
	<id>https://www.theverge.com/rss/stream/15402067</id>
	<link rel="self" type="application/atom+xml" href="https://www.theverge.com/rss/stream/15402067" />

	<icon>https://platform.theverge.com/wp-content/uploads/sites/2/2025/01/verge-rss-large_80b47e.png?w=150&amp;h=150&amp;crop=1</icon>
		<entry>
			
			<author>
				<name>Nick Statt</name>
			</author>
			
			<title type="html"><![CDATA[US declares North Korea the culprit behind devastating WannaCry ransomware attack]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2017/12/18/16793532/us-north-korea-wannacry-ransomware-cyberattack-trump-admin" />
			<id>https://www.theverge.com/2017/12/18/16793532/us-north-korea-wannacry-ransomware-cyberattack-trump-admin</id>
			<updated>2017-12-18T20:14:54-05:00</updated>
			<published>2017-12-18T20:14:54-05:00</published>
			<category scheme="https://www.theverge.com" term="Policy" /><category scheme="https://www.theverge.com" term="Politics" /><category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[The US has declared North Korea the perpetrator of the widespread and financially devastating WannaCry ransomware cyberattack that rapidly spread across the globe in May, hitting hospitals, companies, and other critical institutions in countries around the world. The announcement came in the form of an op-ed in The Wall Street Journal authored by President Donald [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Illustration by Alex Castro / The Verge" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/8726993/acastro_170621_1777_0001_fin.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>The US has declared North Korea the perpetrator of the <a href="https://www.theverge.com/2017/5/14/15638026/wannacry-ransomware-updates-cyberattack-cybersecurity">widespread and financially devastating WannaCry ransomware cyberattack</a> that rapidly spread across the globe in May, hitting hospitals, companies, and other critical institutions in countries around the world. The announcement came in the form of an <a href="https://www.wsj.com/articles/its-official-north-korea-is-behind-wannacry-1513642537">op-ed in <em>The Wall Street Journal</em></a><em> </em>authored by President Donald Trump's Homeland Security Advisor, Thomas Bossert.</p>
<p>News of the administration's announcement was <a href="https://www.washingtonpost.com/world/national-security/us-set-to-declare-north-korea-carried-out-massive-wannacry-cyber-attack/2017/12/18/509deb1c-e446-11e7-a65d-1ac0fd7f097e_story.html?tid=ss_tw&amp;utm_term=.bc66c16ff4c0">reported earlier today by <em>The Washington Post</em></a>, which reports that the White House will be issuing a formal statement tomorrow. It was <a href="https://www.theverge.com/2017/6/14/15805346/wannacry-north-korea-linked-by-nsa">reported back in June</a> that the US National Security …</p>
<p><a href="https://www.theverge.com/2017/12/18/16793532/us-north-korea-wannacry-ransomware-cyberattack-trump-admin">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Jacob Kastrenakes</name>
			</author>
			
			<title type="html"><![CDATA[The NSA reportedly believes North Korea was responsible for WannaCry ransomware attacks]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2017/6/14/15805346/wannacry-north-korea-linked-by-nsa" />
			<id>https://www.theverge.com/2017/6/14/15805346/wannacry-north-korea-linked-by-nsa</id>
			<updated>2017-06-14T20:29:18-04:00</updated>
			<published>2017-06-14T20:29:18-04:00</published>
			<category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[North Korea increasingly appears to have been behind the ransomware attack that infected hundreds of thousands of computers last month and shut down hospitals, businesses, and other systems in the process. The Washington Post is now reporting that the US National Security Agency believes with "moderate confidence" that the ransomware, called WannaCry, came from hackers [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Image: SecureList / AO Kaspersky Lab" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/8516105/wannacry_05_1024x774.png?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>North Korea increasingly appears to have been behind the ransomware attack that <a href="https://www.theverge.com/2017/5/14/15637888/authorities-wannacry-ransomware-attack-spread-150-countries">infected hundreds of thousands of computers</a> last month and <a href="https://www.theverge.com/2017/5/12/15630354/nhs-hospitals-ransomware-hack-wannacry-bitcoin">shut down </a>hospitals, businesses, and other systems in the process.</p>
<p><a href="https://www.washingtonpost.com/world/national-security/the-nsa-has-linked-the-wannacry-computer-worm-to-north-korea/2017/06/14/101395a2-508e-11e7-be25-3a519335381c_story.html?utm_term=.23b8a592a178"><em>The Washington Post </em>is now reporting</a> that the US National Security Agency believes with "moderate confidence" that the ransomware, called WannaCry, came from hackers sponsored by North Korea's spy agency. The report isn't public, but the <em>Post </em>says the assessment has been distributed within the agency.</p>
<figure class="wp-block-pullquote alignleft"><blockquote><p>The connection was much weaker last month</p></blockquote></figure>
<p>North Korea was <a href="https://www.theverge.com/2017/5/15/15643226/wannacry-ransomware-north-korea-attribution-wannacrypt">first linked</a> to WannaCry last month. Several cybersecurity researchers, including …</p>
<p><a href="https://www.theverge.com/2017/6/14/15805346/wannacry-north-korea-linked-by-nsa">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Russell Brandom</name>
			</author>
			
			<title type="html"><![CDATA[Windows XP computers were mostly immune to WannaCry]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2017/5/30/15712542/windows-xp-wannacry-protect-ransomware-blue-screen" />
			<id>https://www.theverge.com/2017/5/30/15712542/windows-xp-wannacry-protect-ransomware-blue-screen</id>
			<updated>2017-05-30T13:45:19-04:00</updated>
			<published>2017-05-30T13:45:19-04:00</published>
			<category scheme="https://www.theverge.com" term="Microsoft" /><category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[Windows XP isn't as vulnerable to the WannaCry ransomware as many assumed, according to a new report from Kryptos research. The company's researchers found that XP computers hit with the most common WannaCry attack tended to simply crash without successfully installing or spreading the ransomware. If true, the result would undercut much of the early [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/assets/4080099/winxpsupport1_640.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Windows XP isn't as vulnerable to the WannaCry ransomware as many assumed, according to <a href="https://blog.kryptoslogic.com/malware/2017/05/29/two-weeks-later.html">a new report from Kryptos research</a>. The company's researchers found that XP computers hit with the most common WannaCry attack tended to simply crash without successfully installing or spreading the ransomware. If true, the result would undercut much of the early reporting on Windows XP's role in spreading the globe-spanning ransomware.</p>
<p>The core of WannaCry is a vulnerability in a Windows file-sharing system called SMB, which allowed WannaCry to spread quickly across vulnerable systems with no user interaction. But when Kryptos researchers targeted an XP …</p>
<p><a href="https://www.theverge.com/2017/5/30/15712542/windows-xp-wannacry-protect-ransomware-blue-screen">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Russell Brandom</name>
			</author>
			
			<title type="html"><![CDATA[Almost all WannaCry victims were running Windows 7]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2017/5/19/15665488/wannacry-windows-7-version-xp-patched-victim-statistics" />
			<id>https://www.theverge.com/2017/5/19/15665488/wannacry-windows-7-version-xp-patched-victim-statistics</id>
			<updated>2017-05-19T13:53:09-04:00</updated>
			<published>2017-05-19T13:53:09-04:00</published>
			<category scheme="https://www.theverge.com" term="Microsoft" /><category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[One week after it first hit, researchers are getting a better handle on how the WannaCry ransomware spread so quickly - and judging from the early figures, the story seems to be almost entirely about Windows 7. According to data released today by Kaspersky Lab, roughly 98 percent of the computers affected by the ransomware [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/assets/1627205/win7.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>One week after it first hit, researchers are getting a better handle on how the WannaCry ransomware spread so quickly - and judging from the early figures, the story seems to be almost entirely about Windows 7.</p>
<p>According to <a href="https://twitter.com/craiu/status/865562842149392384">data released today by Kaspersky Lab</a>, roughly 98 percent of the computers affected by the ransomware were running some version of Windows 7, with less than one in a thousand running Windows XP. 2008 R2 Server clients were also hit hard, making up just over 1 percent of infections.</p>
<div class="twitter-embed"><a href="https://twitter.com/craiu/status/865562842149392384" target="_blank" rel="noopener noreferrer">View Link</a></div>
<p>Windows 7 is still by far <a href="https://www.netmarketshare.com/operating-system-market-share.aspx?qprid=10&amp;qpcustomd=0">the most common version of Windows</a>, running on roughly four times as many computers as Windows 10 worldwid …</p>
<p><a href="https://www.theverge.com/2017/5/19/15665488/wannacry-windows-7-version-xp-patched-victim-statistics">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Russell Brandom</name>
			</author>
			
			<title type="html"><![CDATA[The NSA’s leaked Windows hack caused more damage than just WannaCry]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2017/5/17/15655484/wannacry-variants-bitcoin-monero-adylkuzz-cryptocurrency-mining" />
			<id>https://www.theverge.com/2017/5/17/15655484/wannacry-variants-bitcoin-monero-adylkuzz-cryptocurrency-mining</id>
			<updated>2017-05-17T16:14:01-04:00</updated>
			<published>2017-05-17T16:14:01-04:00</published>
			<category scheme="https://www.theverge.com" term="Crypto" /><category scheme="https://www.theverge.com" term="Report" /><category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[When the ShadowBrokers first published the code for EternalBlue - an NSA exploit targeting Windows' file-sharing protocol - researchers knew it was a bad bug. But most had no idea of the scale of the damage that would be caused by the vulnerability. Much of that damage has only become visible in recent days, as [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/assets/2243371/hacker-stock1_2040.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>When the ShadowBrokers <a href="https://www.theverge.com/2017/4/14/15300826/shadow-brokers-nsa-windows-exploits-hacking">first published the code for EternalBlue</a> - an NSA exploit targeting Windows' file-sharing protocol - researchers knew it was a bad bug. But most had no idea of the scale of the damage that would be caused by the vulnerability.</p>
<p>Much of that damage has only become visible in recent days, as a ransomware program dubbed "WannaCry" locked up computers <a href="https://www.theverge.com/2017/5/12/15630354/nhs-hospitals-ransomware-hack-wannacry-bitcoin">from the UK's National Health Service to the Russian Ministry of the Interior</a>. Some of the damage caused by EternalBlue was harder to spot, caused by more discreet malware designed to infect and monetize computers without leaving a trace. As researchers look for clues as to W …</p>
<p><a href="https://www.theverge.com/2017/5/17/15655484/wannacry-variants-bitcoin-monero-adylkuzz-cryptocurrency-mining">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Colin Lecher</name>
			</author>
			
			<title type="html"><![CDATA[After WannaCry, a new bill would force the NSA to justify its hacking tools]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2017/5/17/15647508/wannacry-ransomeware-microsoft-nsa-patch-act-hacking" />
			<id>https://www.theverge.com/2017/5/17/15647508/wannacry-ransomeware-microsoft-nsa-patch-act-hacking</id>
			<updated>2017-05-17T12:06:36-04:00</updated>
			<published>2017-05-17T12:06:36-04:00</published>
			<category scheme="https://www.theverge.com" term="Policy" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[After last week's massive ransomware attack shut down machines around the world, the NSA, which knew of the exploit before it was public, became a target for criticism. Microsoft patched the problem before the attack, but it's still raised questions about how, and when, the NSA decides to hold on to software vulnerabilities. The Protecting [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/assets/3794153/nsa_sign3_640.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>After last week's massive ransomware attack shut down machines around the world, the NSA, which knew of the exploit before it was public, became a target for criticism. Microsoft patched the problem before the attack, but it's still raised questions about how, and when, the NSA decides to hold on to software vulnerabilities.</p>
<figure class="wp-block-pullquote alignleft"><blockquote><p>The Protecting Our Ability to Counter Hacking Act of 2017</p></blockquote></figure>
<p>A new bill would help bring accountability to how the NSA deals with those vulnerabilities. Introduced by Sen. Brian Schatz, the <a href="https://www.schatz.senate.gov/imo/media/doc/BAG17434_FINAL%20PATCH.pdf">Protecting Our Ability to Counter Hacking Act of 2017</a>, or PATCH Act, would establish a legal framework for the process, requiring feder …</p>
<p><a href="https://www.theverge.com/2017/5/17/15647508/wannacry-ransomeware-microsoft-nsa-patch-act-hacking">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Russell Brandom</name>
			</author>
			
			<title type="html"><![CDATA[The WannaCry ransomware has mysterious ties to North Korea]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2017/5/15/15643226/wannacry-ransomware-north-korea-attribution-wannacrypt" />
			<id>https://www.theverge.com/2017/5/15/15643226/wannacry-ransomware-north-korea-attribution-wannacrypt</id>
			<updated>2017-05-15T16:24:46-04:00</updated>
			<published>2017-05-15T16:24:46-04:00</published>
			<category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[Researchers at Kaspersky Lab have uncovered new evidence linking the WannaCry ransomware code to North Korea. In a post today, the group detailed a segment of code used in both an early WannaCry variant and a February 2015 sample attributed to the Lazarus Group, a Kaspersky-tracked actor tied to the North Korean government. The overlap [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/assets/4384543/russell-06.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Researchers at Kaspersky Lab have uncovered new evidence linking the WannaCry ransomware code to North Korea. <a href="https://securelist.com/blog/research/78431/wannacry-and-lazarus-group-the-missing-link/">In a post today</a>, the group detailed a segment of code used in both an early WannaCry variant and a February 2015 sample attributed to the Lazarus Group, a Kaspersky-tracked actor tied to the North Korean government. The overlap was first spotted by Google researcher Neal Mehta, and Kaspersky believes the similarity goes far beyond shared code.</p>
<p>"We strongly believe the February 2017 sample was compiled by the same people," Kaspersky writes, "or by people with access to the same source code as the May 2017 WannaCry encryptor used in t …</p>
<p><a href="https://www.theverge.com/2017/5/15/15643226/wannacry-ransomware-north-korea-attribution-wannacrypt">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Russell Brandom</name>
			</author>
			
			<title type="html"><![CDATA[Is Microsoft to blame for the largest ransomware attacks in internet history?]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2017/5/15/15641198/microsoft-ransomware-wannacry-security-patch-upgrade-wannacrypt" />
			<id>https://www.theverge.com/2017/5/15/15641198/microsoft-ransomware-wannacry-security-patch-upgrade-wannacrypt</id>
			<updated>2017-05-15T11:33:59-04:00</updated>
			<published>2017-05-15T11:33:59-04:00</published>
			<category scheme="https://www.theverge.com" term="Microsoft" /><category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[Friday saw the largest global ransomware attack in internet history, and the world did not handle it well. We're only beginning to calculate the damage inflicted by the WannaCry program - in both dollars and lives lost from hospital downtime - but at the same time, we're also calculating blame. There's a long list of [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/6264195/microsoft-build-2016-event-verge_48.0.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Friday saw <a href="https://www.theverge.com/2017/5/12/15630354/nhs-hospitals-ransomware-hack-wannacry-bitcoin">the largest global ransomware attack in internet history</a>, and the world did not handle it well. We're only beginning to calculate the damage inflicted by the WannaCry program - in both dollars and lives lost from hospital downtime - but at the same time, we're also calculating blame.</p>
<p>There's a long list of parties responsible, including the criminals, <a href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/">the NSA</a>, and the victims themselves - but the most controversial has been Microsoft itself. The attack exploited a Windows networking protocol to spread within networks, and while Microsoft released a patch nearly two months ago, it's become painfully clear that patch didn't reach a …</p>
<p><a href="https://www.theverge.com/2017/5/15/15641198/microsoft-ransomware-wannacry-security-patch-upgrade-wannacrypt">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Rich McCormick</name>
			</author>
			
			<title type="html"><![CDATA[Microsoft says governments should stop &#8216;hoarding&#8217; security vulnerabilities after WannaCry attack]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2017/5/15/15639890/microsoft-wannacry-security-vulnerabilities-ransomware" />
			<id>https://www.theverge.com/2017/5/15/15639890/microsoft-wannacry-security-vulnerabilities-ransomware</id>
			<updated>2017-05-15T04:59:27-04:00</updated>
			<published>2017-05-15T04:59:27-04:00</published>
			<category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[As news of the WannaCry ransomware attack broke last week, companies and governments scrambled first to keep it contained. Now, with more details about its origins and effects clear, those organizations are issuing their official responses. Among the first is Microsoft, which rushed out an emergency patch for Windows XP on Friday, after formally ending [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Image: SecureList / AO Kaspersky Lab" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/8516105/wannacry_05_1024x774.png?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>As news of the WannaCry ransomware attack broke last week, companies and governments scrambled first to <a href="https://www.theverge.com/2017/5/13/15635050/wannacry-ransomware-kill-switch-protect-nhs-attack">keep it contained</a>. Now, with more details about its origins and effects clear, those organizations are issuing their official responses.</p>
<p>Among the first is Microsoft, which rushed out an <a href="https://www.theverge.com/2017/5/13/15635006/microsoft-windows-xp-security-patch-wannacry-ransomware-attack">emergency patch for Windows XP</a> on Friday, after formally ending support for the operating system three years ago. The company responded to the attacks with <a href="https://blogs.microsoft.com/on-the-issues/2017/05/14/need-urgent-collective-action-keep-people-safe-online-lessons-last-weeks-cyberattack/#sm.001c8i11317l0f3vs2f1cm2qoliu3">a strongly worded blog post</a>, criticizing governments for "stockpiling" information about cybersecurity vulnerabilities, and likening the WannaCry attack to the US military "having some of its Tomahawk  …</p>
<p><a href="https://www.theverge.com/2017/5/15/15639890/microsoft-wannacry-security-vulnerabilities-ransomware">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Andrew Liptak</name>
			</author>
			
			<title type="html"><![CDATA[The WannaCry ransomware attack has spread to 150 countries]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2017/5/14/15637888/authorities-wannacry-ransomware-attack-spread-150-countries" />
			<id>https://www.theverge.com/2017/5/14/15637888/authorities-wannacry-ransomware-attack-spread-150-countries</id>
			<updated>2017-05-14T13:42:13-04:00</updated>
			<published>2017-05-14T13:42:13-04:00</published>
			<category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[Since its discovery on Friday afternoon, the WannaCry ransomware attack has continued to spread this weekend, impacting over 10,000 organizations and 200,000 individuals in over 150 countries, according to European authorities. However, while measures have been taken to slow the spread of the malware, new variations have begun to surface. This morning, Europol director Rob [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/assets/2243371/hacker-stock1_2040.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Since its discovery on Friday afternoon, the WannaCry ransomware attack has continued to spread this weekend, impacting over 10,000 organizations and 200,000 individuals in over 150 countries, according to European authorities. However, while measures have been taken to slow the spread of the malware, new variations have begun to surface.</p>
<p>This morning, Europol director Rob Wainwright <a href="http://www.bbc.com/news/technology-39913630">told the <em>BBC</em></a> that the cyberattack is "unprecedented in its scale," and noted that it will likely continue as people return to work on Monday. While <a href="https://www.theverge.com/2017/5/13/15635006/microsoft-windows-xp-security-patch-wannacry-ransomware-attack">Microsoft took the unusual step to issue a patch for Windows XP</a>, the patch will only work if installed, and autho …</p>
<p><a href="https://www.theverge.com/2017/5/14/15637888/authorities-wannacry-ransomware-attack-spread-150-countries">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
	</feed>
