Microsoft is calling for collective action against the National Security Agency (NSA) after it was discovered that the WanaCrypt exploits used in the attack were drawn from the exploits stolen from agency.Brad Smith, Microsoft President and Chief Legal Officer though the theft was publicly reported earlier this year some computers remained unpatched causing thousands to be vulnerable, as a result, hospitals, businesses, governments, and computers at homes were affected.“The governments of the world should treat this attack as a wake-up call. They need to take a different approach and adhere in cyberspace to the same rules applied to weapons in the physical world. We need governments to consider the damage to civilians that comes from hoarding these vulnerabilities and the use of these exploits,” Smith said.Smith added that governments should report vulnerabilities to vendors, rather than stockpile, sell, or exploit them thereby defending every customer everywhere in the face of cyberattacks, regardless of their nationality.
“We should take from this recent attack a renewed determination for more urgent collective action. We need the tech sector, customers, and governments to work together to protect against cybersecurity attacks. More action is needed, and it’s needed now. In this sense, the WannaCrypt attack is a wake-up call for all of us. We recognize our responsibility to help answer this call, and Microsoft is committed to doing its part,” he added.
WanaCry ransomware outbreak also known as WanaCrypt0r began May 12 and has now infected over 10,000 organizations and 200,000 individuals in 150 countries including UK National Health System and Fedex in the US. On Friday a researcher accidentally stopped WanaCry’s spread by registering a domain that served as a kill switch for the ransomware but after a few hours a second variant of the WannaCry ransomware started emerging and was also stopped in the same way is not encrypting already infected machines due to an error in programming, but it is spreading.