The computing giant said software vulnerabilities hoarded by governments had caused "widespread damage", the BBC reported. The person credited with slowing down the malware attack is a 22-year old British cybersecurity researcher who accidentally stumbled upon a kill-switch in the software. In March, Microsoft released a security patch to address this vulnerability but since not all networks and computers have updated their systems, they are at risk.
However, NHS Digital said only 4.7% of the NHS is now using Windows XP, with the figure decreasing, and a spokesperson told BJ-HC today that no evidence has been found as of yet that patient data was compromised in the cyber attack.
According to Microsoft, computers affected by the so-called "ransomware" did not have security patches for various Windows versions installed or were running Windows XP, which the company no longer supports.
Should you ever pay the ransom?
Vietnam Computer Emergency Response Team (VNCERT) under the Ministry of Information and Communications has urged organizations and companies nationwide to prevent possible attacks from WannaCry ransomware.
Trump willing to engage North Korea: Seoul
It stressed the importance of North Korea "immediately showing honest commitment to denuclearization through concrete action". North Korea claims the missile is a new medium-long range ballistic rocket capable of carrying a heavy nuclear warhead.
Experts are suspecting that the next wave of attacks will be subjected to the banking sector.
President Trump's homeland security adviser Tom Bossert told ABC News' Good Morning America that the unprecedented global cyberattack sends an "urgent call for collective action" by governments throughout the world. So MalwareTech bought the domain name himself, hoping to use it to track WannaCry as it spread.
Europol said: This is the first ever detected malware combining these features, which makes it unique.
The ransomware called WannaCrypt or WannaCry encrypts the computer's hard disk drive and then spreads laterally between computers on the same LAN. But Darien Huss, a ProofPoint researcher in IN, confirmed that what MalwareTech had actually triggered was a "kill switch" that instructed WannaCry to stop spreading. Such attacks are neither new nor particularly sophisticated. Shadow Brokers said that they obtained it from a secret NSA server. There are also other theories.
While the cyber-attacks were all outside the United States, Steven Mnuchin, the U.S. Treasury Secretary reiterated the importance of cyber security. Reports suggest that over two lakh systems globally could have been infected by the malicious software that blocks access to a system until a sum of money is paid.