ジローのヨーロッパ考

デンマークやドイツの農家に長期(?)滞在、体験したり感じたことを綴ります。

ドイツ: cyber attacks の影響はこんなところにも

2017-05-15 18:10:51 | 日記
2017年5月15日(Mon.) 世界中を騒がせているサイバー攻撃は、ドイツ鉄道(DB)にも及んでいるようです。 ( ニュースソース: THE LOCAL de 5月13日発 )

<原文の一部>
International cyber attacks put ransoms on German rail station screens
13 May 2017   16:11 CEST+02:00



A fast-moving wave of cyber attacks that swept the globe Friday targeted German rail operator Deutsche Bahn.  
 (注: Deutsche Bahn = ドイツ鉄道)

The software attacks exploited a flaw exposed in documents leaked from the US National Security Agency and use a technique known as ransomware that locks users' files unless they pay the attackers a designated sum in the virtual currency Bitcoin, reports news agency AFP.

The ransomware demands payment of 275 euros in Bitcoin within three days or the price is doubled, and if none is received in seven days, the files will be deleted, according to a screen message.

Affected by the onslaught were computer networks at hospitals in Britain, Russia's interior ministry, the Spanish telecom giant Telefonica and the US delivery firm FedEx, as well as organisations in Sweden.

The US Department of Homeland Security's computer emergency response team said it was aware of ransomware infections "in several countries around the world."

Jakub Kroustek of the security firm Avast said in a blog post update around 2000 GMT, "We are now seeing more than 75,000 detections... in 99 countries."

Germany's Deutsche Bahn (DB) computers were also impacted, with the company reporting on Saturday morning that display panels in the stations were affected.

Deutsche Bahn information screens and ticket machines were also hit, reports AFP.

Travellers tweeted pictures of hijacked departure boards showing the ransom demand instead of train times. But DB insisted that trains were running as normal.



On Saturday, a cyber security researcher told AFP he had accidentally discovered a "kill switch" that can prevent the spread of the ransomware.

The researcher, tweeting as @MalwareTechBlog, said the discovery was accidental, but that registering a domain name used by the malware stops it from spreading. Computers already affected will not be helped by the solution.

However @MalwareTechBlog warned that the "crisis isn't over" as those behind it "can always change the code and try again."

The ransomware's name is WCry, but analysts were also using variants such as WannaCry.

"It's unequivocally scary," said John Dickson of the Denim Group, a US security consultancy.

Dickson said the malware itself, which exploits a flaw in Windows, was not new but that adding the ransomware "payload" made it especially dangerous.

"I'm watching how far this propagates and when governments get involved," he said.

Microsoft released a patch to protect against vulnerability to the ransomware in March, but many systems may not have been updated.

(抜粋)注: 大半の内容は報道されていますので訳を略します。 但し、DBの運行表示器や券売機なども被害にあったと伝えています。 尚、列車の運行そのものはノーマルだったと言っています。 
加えて、被害の拡大防止になる "kill switch" が見つかったとも伝えています・・・。

***

いわゆる 「身代金」 は高額ではないようですが、様々な方面に障害をもたらしているようです。 これに限らずですが、悪意を持って意図的に行う犯罪行為は、現状より遥かに厳しい処罰を科すべきではないでしょうか、過失によるものは別ですが・・・。



「刺したことは認めるが殺意はなかった」 などと言い放つヤツラも同様です。 また、責任能力があるとかないとか議論する以前に、結果に対する責任は負ってもらうべきでしょう。 これも過失は別でしょうが・・・。  どうも、被害者の人権よりも、加害者の人権を尊重しすぎているように感じられることが多いのです・・・。

*** 下の写真は、記事内容とは関係ありません。



***

最新の画像もっと見る

コメントを投稿