Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

LG Electronics Attacked with WannaCry Ransomware, Company Halts Systems’ Working

 

LG Electronics reports that it found the WannaCry malware infecting one of its "help yourself" kiosks installed within South Korea previously in August 2017. The infection compelled the company to close working of its network's different divisions at a stretch of more than 2 days.

 

Previously in 2017, the WannaCry infection impaired more than 300,000 devices. As the ransomware attack caused devices and their stored data go under the attackers' control, many users were compelled towards halting their work. It could've impacted even more organizations had not researcher Marcus Hutchins accidentally stopped the virus. During March, Microsoft had patched a particular vulnerability that WannaCry attackers exploited; however, the company as well issued one emergency patch for Windows XP along with other Windows editions which didn't have the support.

 

According to a spokesperson of LG, the consumer electronics giant had examined the malware due to which a few service centers suffered delayed operations on August 14 as the company took Korea Internet & Security Agency's assistance to confirm that the malicious code was in fact the ransom software. As a result, LG had to shut down its affected service center for ensuring the malware did not proliferate to the organization's remaining parts.

 

The company states that it lost no data whatsoever while it didn't also pay up to the ransom demand. Zdnet.com posted this on the Web dated August 21, 2017.

 

A combined effort by LG Electronics and Korea Internet & Security Agency continues for determining the way WannaCry managed contaminating the network of the electronics manufacturer's self-service center. While LG's data remained intact and the company didn't pay any ransom, it had already deployed the security patches onto the tainted systems.

 

LG further said that each of its automatic reception terminals that contracted the virus' infection was working alright again after a period of 2 days, while the company had also completed the deployment of security updates onto those reception terminals.

 

That therefore suggests that LG had not implemented the patches onto its networks before the malware assault which left the company susceptible to WannaCry as well as other malware.

» SPAMfighter News - 8/31/2017

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next