The attack that began Friday is believed to be the biggest online extortion attack ever recorded, with victims including Britain's hospital network and Germany's national railway. It encrypts data on infected computers and demands payment before the information is unencrypted.
The ransomware locks down all the files on an infected computer and asks the computer's administrator to pay in order to regain control of them.
Spanish authorities confirmed the ransomware is spreading through the vulnerability, called "EternalBlue", and advised people to patch. Microsoft has issued a customer guidance for the WannaCrypt attacks.
The NSA and other spy agencies look for software vulnerabilities and then build tools to target and exploit them. He said companies can apply the patch released in March to all systems to prevent WannaCry infections. Under this system, all Windows 10 PCs are kept up-to-date ... unless they are in larger businesses, which still have the option to delay updates for many months.
He continued that users must ensure they update their computer's security systems regularly.
Ransomware is a particularly stubborn problem because victims are often tricked into allowing the malicious software to run on their computers, and the encryption happens too fast for security software to catch it.
Microsoft has released patches for Windows Server 2003 SP2 x64, Windows Server 2003 SP2 x86, Windows XP SP2 x64, Windows XP SP3 x86, Windows XP Embedded SP3 x86, Windows 8 x86, and Windows 8 x64.
The attack has been found in 150 countries, affecting 200,000 computers, according to Europol, the European law enforcement agency.
The National Health Service (NHS) said it was responding to the incidents.
Ballad beats glitz as Portugal's Sobral wins Eurovision
Yet heightened security has seen officers patrolling with semi-automatic machine guns and camouflaged police vans on the streets. The authorities handed out a map of gay-friendly venues to fans of the contest with a massive gay following.
The NSA is now partially responsible for the global havoc that has caused hospitals to turn away patients, manufacturing to shut down, ATMs to go dark, and long shifts for cybersecurity professionals. Pyotr Lidov, a spokesman for Megafon, said Friday's attacks froze computers in company's offices across Russian Federation.
Cybersecurity firm Avast said it has tracked more than 75,000 attacks in 99 countries.
"IT managers need to be extremely aware that new variants of this ransomware attack are being launched nearly hourly, so they can't just check that their computer systems are protected, then relax, assuming everything will stay that way", he said. Install all Windows updates. 5. Officials urged organizations and companies to immediately update their security software.
"It's very important everyone understands that all they (the hackers) need to do is change some code and start again".
The attack was apparently halted in the afternoon in the United Kingdom when a researcher took control of an Internet domain that acted as a kill switch for the worm's propagation, according to Ars Technica.
The spread of the ransomware capped a week of cyber turmoil in Europe that kicked off a week earlier when hackers posted a huge trove of campaign documents tied to French candidate Emmanuel Macron just 1-1/2 days before a run-off vote in which he was elected as the new president of France. But Microsoft says that it had already fixed the vulnerability that enabled this attack.
Computers and networks that hadn't recently updated their systems are still at risk because the ransomware is lurking.
Michael Gazeley, managing director of cybersecurity firm Network Box, told CNN that the danger is far from over and that a company's security patch on Saturday might not still work by Monday.
Smith said he hopes that the recent attack renews determination for more urgent collective action between the technology sector, customers, and governments against cyber attacks.