The latest statement from the NCSC (14/05/17):
Since the global coordinated ransomware attack on thousands of private and public sector organisations across dozens of countries on Friday, there have been no sustained new attacks of that kind. But it is important to understand that the way these attacks work means that compromises of machines and networks that have already occurred may not yet have been detected, and that existing infections from the malware can spread within networks.
This means that as a new working week begins it is likely, in the UK and elsewhere, that further cases of ransomware may come to light, possibly at a significant scale.
Our national focus must therefore be on two lines of defence.
The first is to limit the spread and impact of the attacks that have already occurred. Due to broad government and partner efforts, a variety of tools are now publicly available to help organisations to do this. This guidance can be found on our homepage – ncsc.gov.uk – under the title 'Protecting Your Organisation From Ransomware'.
We know already that there have been attempts to attack organisations beyond the National Health Service. It is therefore absolutely imperative that any organisation that believes they may be affected, follows and implements this guidance.
We have set out two pieces of guidance: one for organisations and one for private individuals and small to medium enterprises (SMEs) which can be applicable regardless of the age of the software in question. It will be updated as and when further mitigations become available and we will announce when updates have been made on Twitter (@ncsc) and elsewhere.
Secondly, it is possible that a ransomware attack of this type and on this scale could recur, though we have no specific evidence that this is the case. What is certain is that ransomware attacks are some of the most immediately damaging forms of cyber attack that affects home users, enterprises and governments equally.
It is also the case that there are a number of easy-to-implement defences against ransomware which very considerably reduce the risk of attack and the impact of successful attacks. These simple steps to protect against ransomware could be applied more thoroughly by the public and organisations
Companies can undertake three simple steps which are also set out on our website and can be summarised as follows:
- Keep your organisation's security software patches up to date
- Use proper antivirus software services
- Most importantly for ransomware, back up the data that matters to you, because you can't be held to ransom for data you hold somewhere else.
Find the guidance here.
Home users and small businesses can take the following steps to protect themselves:
- Run Windows Update
- Make sure your antivirus product is up to date and run a scan – if you don’t have one install one of the free trial versions from a reputable vendor
- If you have not done so before, this is a good time to think about backing important data up – you can’t be held to ransom if you’ve got the data somewhere else.
Find the guidance here.
In the days ahead, the NCSC, working closely with the National Crime Agency in support of their criminal investigation, and with international partners in both other governments and the commercial sector, will continue our round-the-clock effort to get ahead of this threat. We would like to reassure the public that resources from the Government, law enforcement and public and private sector organisation are working together to manage further disruption from the current attack and to increase protection against any further attacks in the coming days. The country's security and law enforcement agencies are working round the clock to protect the public. Private sector efforts have made a very significant contribution to mitigate the cyber attacks so far and to prevent further disruption.
We will provide further updates as and when appropriate.
Key information and points of contact
• Ransomware attacks are typically carried out by criminal groups however we cannot rule out anything while investigations are ongoing.
• Existing NCSC guidance provides organisations with information about how to protect themselves from ransomware attacks.
• The government is fully committed to defending against cyber threats and address the cyber skills gap to develop and grow talent. A five year National Cyber Security Strategy (NCSS) was announced in November 2016, supported by £1.9billion of transformational investment.
• The NCSC was opened by HM The Queen in February 2017 and provides a single, central body for cyber security at a national level. It provides advice for national cyber security incidents, carries out real-time threat analysis and provides tailored sectoral guidance.
Points of contact/interest:
Statement below published (12/05/17):
Ciaran Martin, CEO of the National Cyber Security Centre said:
“Today we have seen a set of global cyber attacks against thousands of organisations and individuals in dozens of countries.
“The National Cyber Security Centre is working round the clock with UK and international partners and with private sector experts to lead the response to these cyber attacks.
“The picture is emerging that this is affecting multiple countries and sectors and is not solely targeted at the NHS. As the Prime Minister said, we have no evidence that UK National Health Service patient data has been stolen.
“We are very aware that attacks on critical services such as the NHS have a massive impact on individuals and their families, and we are doing everything in our power to help them restore these vital services.
“It is important that organisations reduce the risks of these attacks happening to them. There are three pieces of important advice to help protect your organisation:
1. Make sure your security software patches are up to date
2. Make sure that you are running proper anti-virus software
3. Back up your data somewhere else because you can’t be held to ransom if you’ve got the data somewhere else."