Advertisement

An initial report from UK-based MalwareTech researcher indicate that the ransomware was spreading peer-to-peer and may have been weaponized using a leaked Microsoft Windows exploit (EternalBlue) stolen from the U.S. National Security Agency.

Advertisement

Among those to first report infections publicly are 16 hospitals in England and the Spanish telecom Telefonica. The infected systems rendered files encrypted and inaccessible and a warning flashed across the screens. “You only have 3 days to submit the payment. After that the price will be doubled,” it reads. “Also if you don’t pay in 7 days, you won’t be able to recover your files forever.”

Advertisement


Update 5/12/17 2:34p EDT: FedEx confirmed to the BBC that it is experiencing “interference” with some of Windows-based systems “caused by malware.” The company said it was “implementing remediation steps as quickly as possible.”

According to SwiftOnSecurity, after FedEx detected WannaCry infections at its UK offices, the company ordered its US partners to shut down all non-critical networked Windows-based systems.

Advertisement

Update 5/12/17 3:04p EDT: Click here for information about the Windows versions or editions affected and for details on how to patch (MS17-010) the EternalBlue exploit. Or click here for instructions on how to review and install high-priorities updates on your Windows laptop or PC.

This article will continue to be updated as new information comes in.