Serangan perangkat pemeras WannaCry: Perbedaan antara revisi
Konten dihapus Konten ditambahkan
Tidak ada ringkasan suntingan |
Rescuing 1 sources and tagging 0 as dead.) #IABot (v2.0.9.2 |
||
(46 revisi perantara oleh 18 pengguna tidak ditampilkan) | |||
Baris 1:
{{expand language|topic=|langcode=en|otherarticle=WannaCry cyber attack|date=Mei 2017}}
{{Infobox event
| title = Serangan perangkat pemeras WannaCry
| image =
| image_size =
| image_alt =
| caption = Cuplikan layar
| english_name =
| time =
| duration =
| date = {{start date|2017|5|12}} –
| location = Seluruh dunia
| also_known_as = WannaCrypt, WanaCrypt0r
| type = [[Serangan siber]] dengan perangkat tebusan
| theme = Perangkat pemeras mengenkripsi diska keras dengan permintaan $300 – $600
Baris 47 ⟶ 45:
}}
'''Serangan perangkat pemeras WannaCry''' adalah sebuah perangkat tebusan. Pada Mei 2017, serangan siber skala besar menggunakan perangkat ini diluncurkan, menginfeksi lebih dari 75.000 komputer di 99 negara, menuntut pembayaran tebusan dalam 20 bahasa.
Serangan ini mengenai [[Telefónica]] dan beberapa perusahaan besar lainnya di Spanyol, serta sebagai dari
</ref><ref>{{Cite news|url=https://www.theguardian.com/technology/2017/may/12/nhs-ransomware-cyber-attack-what-is-wanacrypt0r-20|title=What is 'WanaCrypt0r 2.0' ransomware and why is it attacking the NHS?|last=Hern|first=Alex|date=2017-05-12|work=The Guardian|last2=Gibbs|first2=Samuel|language=en-GB|issn=0261-3077|access-date=2017-05-12}} CS1 maint: Unrecognized language ([[:Kategori:CS1 maint: Unrecognized language|link]])
</ref><ref>{{Cite web|url=https://digital.nhs.uk/article/1491/Statement-on-reported-NHS-cyber-attack|title=Statement on reported NHS cyber attack|website=digital.nhs.uk|language=en-GB|access-date=2017-05-12}} CS1 maint: Unrecognized language ([[:Kategori:CS1 maint: Unrecognized language|link]])
Baris 55 ⟶ 53:
</ref><ref name="cnn99countries">{{Cite news|url=http://money.cnn.com/2017/05/12/technology/ransomware-attack-nsa-microsoft/|title=Massive ransomware attack hits 99 countries|last=Larson|first=Selena|date=2017-05-12|work=CNN|access-date=2017-05-12}}</ref> Lebih dari 1.000 komputer di [[Kementerian Urusan Dalam Negeri (Rusia)|Kementerian Urusan Dalam Negeri Rusia]], Kementerian Darurat Rusia dan perusahaan telekomunikasi Rusia [[MegaFon]], telah dilaporkan terinfeksi.<ref name=":2">{{Cite news|url=https://www.rt.com/news/388153-thousands-ransomeware-attacks-worldwide/|title=Ransomware virus plagues 75k computers across 99 countries|work=RT International|language=en-US|access-date=2017-05-12}}</ref>
WannaCry diyakini menggunakan
Di Indonesia, perangkat ini menyerang sejumlah komputer di berbagai rumah sakit umum dengan permintaan uang tebusan Rp 4.000.000 untuk mengembalikan komputer ke sediakala.
<ref>{{Cite web|url=https://www.theregister.co.uk/2017/05/12/spain_ransomware_outbreak/|title=WanaCrypt ransomware snatches NSA exploit, fscks over Telefónica, other orgs in Spain|last=15:58|first=12 May 2017 at|last2=tweet_btn()|first2=John Leyden|website=theregister.co.uk|access-date=12 May 2017}}</ref>
== Latar belakang ==
Vektor infeksi yang diklaim, [[EternalBlue]], dirilis oleh kelompok peretas [[The Shadow Brokers]] pada tanggal 14 April 2017<ref>{{cite news|url=http://www.reuters.com/article/2015/02/16/us-usa-cyberspying-idUSKBN0LK1QV20150216|title=Russian researchers expose breakthrough U.S. spying program|last=Menn|first=Joseph|date=17 February 2015
EternalBlue memanfaatkan kerentanan MS17-010<ref name="microsoft.com">{{cite web|url=https://technet.microsoft.com/en-us/library/security/ms17-010.aspx|title=Microsoft Security Bulletin MS17-010 – Critical|website=technet.microsoft.com|access-date=13 May 2017}}</ref> dalam implementasi protokol [[Server Message Block]] (SMB) [[Microsoft]]. Microsoft telah merilis sebuah "critical" advisory, bersamaan dengan pembaruan tambalan untuk mengatasi kerentanan sebulan sebelumnya, pada tanggal 14 Maret 2017.<ref name="microsoft.com" /> Tambalan ini memperbaiki beberapa versi workstation dari sistem operasi [[Microsoft Windows]], termasuk [[Windows Vista]] dan [[Windows 8.1]], serta versi server dan embedded seperti [[Windows Server 2008]] dan [[Windows Embedded POSReady 2009]], namun bukan [[Windows XP]] yang lebih tua, menurut Microsoft.<ref name="microsoft.com" />
Mulai 21 April 2017, periset keamanan mulai melaporkan bahwa komputer dengan [[backdoor]] [[
== Serangan siber ==
[[
Pada tanggal 12 Mei 2017, WannaCry mulai mempengaruhi komputer di seluruh dunia.<ref>{{cite web|last1=Newman|first1=Lily Hay|title=The Ransomware Meltdown Experts Warned About Is Here|url=https://www.wired.com/2017/05/ransomware-meltdown-experts-warned/|website=Wired.com|access-date=13 May 2017}}</ref> Infeksi awal mungkin disebabkan oleh kerentanan pertahanan jaringan atau [[Pengelabuan|serangan pengelabuan tombak]] yang sangat bagus.<ref>{{Cite news|url=https://arstechnica.com/security/2017/05/an-nsa-derived-ransomware-worm-is-shutting-down-computers-worldwide/|title=An NSA-derived ransomware worm is shutting down computers worldwide|last=Goodin|first=Dan|work=ARS Technica|access-date=2017-05-14|language=en-US}}</ref> Saat dieksekusi, malware pertama kali memeriksa "kill switch" [[nama domain]]. Jika tidak ditemukan, maka ransomware mengenkripsi data komputer,<ref name=":1">{{Cite news|url=http://www.telegraph.co.uk/news/2017/05/12/russian-linked-cyber-gang-shadow-brokers-blamed-nhs-computer/|title=Russian-linked cyber gang blamed for NHS computer hack using bug stolen from US spy agency|work=The Telegraph|access-date=12 May 2017|language=en-GB}}</ref><ref name=syma /><ref>{{Cite news|url=https://www.nytimes.com/2017/05/12/world/europe/uk-national-health-service-cyberattack.html|title=Hackers Hit Dozens of Countries Exploiting Stolen N.S.A. Tool|last=Bilefsky|first=Dan|date=12 May 2017|work=The New York Times|access-date=12 May 2017|last2=Perlroth|first2=Nicole|issn=0362-4331}}</ref> kemudian mencoba untuk memanfaatkan kerentanan SMB untuk menyebar ke komputer acak di Internet,<ref name=mbytes>{{cite web|last1=Clark|first1=Zammis|title=The worm that spreads WanaCrypt0r|url=https://blog.malwarebytes.com/threat-analysis/2017/05/the-worm-that-spreads-wanacrypt0r/|website=Malwarebytes Labs|publisher=malwarebytes.com|access-date=13 May 2017}}</ref> dan "lateral" ke komputer pada [[Jaringan
▲Pada tanggal 12 Mei 2017, WannaCry mulai mempengaruhi komputer di seluruh dunia.<ref>{{cite web|last1=Newman|first1=Lily Hay|title=The Ransomware Meltdown Experts Warned About Is Here|url=https://www.wired.com/2017/05/ransomware-meltdown-experts-warned/|website=Wired.com|access-date=13 May 2017}}</ref> Infeksi awal mungkin disebabkan oleh kerentanan pertahanan jaringan atau [[Pengelabuan|serangan pengelabuan tombak]] yang sangat bagus.<ref>{{Cite news|url=https://arstechnica.com/security/2017/05/an-nsa-derived-ransomware-worm-is-shutting-down-computers-worldwide/|title=An NSA-derived ransomware worm is shutting down computers worldwide|last=Goodin|first=Dan|work=ARS Technica|access-date=2017-05-14|language=en-US}}</ref> Saat dieksekusi, malware pertama kali memeriksa "kill switch" [[nama domain]]. Jika tidak ditemukan, maka ransomware mengenkripsi data komputer,<ref name=":1">{{Cite news|url=http://www.telegraph.co.uk/news/2017/05/12/russian-linked-cyber-gang-shadow-brokers-blamed-nhs-computer/|title=Russian-linked cyber gang blamed for NHS computer hack using bug stolen from US spy agency|work=The Telegraph|access-date=12 May 2017|language=en-GB}}</ref><ref name=syma /><ref>{{Cite news|url=https://www.nytimes.com/2017/05/12/world/europe/uk-national-health-service-cyberattack.html|title=Hackers Hit Dozens of Countries Exploiting Stolen N.S.A. Tool|last=Bilefsky|first=Dan|date=12 May 2017|work=The New York Times|access-date=12 May 2017|last2=Perlroth|first2=Nicole|issn=0362-4331}}</ref> kemudian mencoba untuk memanfaatkan kerentanan SMB untuk menyebar ke komputer acak di Internet,<ref name=mbytes>{{cite web|last1=Clark|first1=Zammis|title=The worm that spreads WanaCrypt0r|url=https://blog.malwarebytes.com/threat-analysis/2017/05/the-worm-that-spreads-wanacrypt0r/|website=Malwarebytes Labs|publisher=malwarebytes.com|access-date=13 May 2017}}</ref> dan "lateral" ke komputer pada [[Jaringan wilayah lokal]] yang sama.<ref>{{cite web|last1=Samani|first1=Raj|title=An Analysis of the WANNACRY Ransomware outbreak|url=https://securingtomorrow.mcafee.com/executive-perspectives/analysis-wannacry-ransomware-outbreak/|publisher=McAfee|access-date=13 May 2017}}</ref> Seperti pada perangkat pemeras modern lainnya, muatan menampilkan pesan yang menginformasikan pengguna bahwa file telah dienkripsi, dan menuntut pembayaran sekitar $300 dalam [[bitcoin]] dalam tiga hari atau $600 dalam waktu tujuh hari.<ref name=syma>{{cite web|title=What you need to know about the WannaCry Ransomware|url=https://www.symantec.com/connect/blogs/what-you-need-know-about-wannacry-ransomware|publisher=Symantec Security Response|accessdate=14 May 2017}}</ref><ref>{{Cite news|url=https://www.wsj.com/articles/more-cyberattack-victims-emerge-as-agencies-search-for-clues-1494671938|title=More Cyberattack Victims Emerge as Agencies Search for Clues|last=Thomas|first=Andrea|date=2017-05-13|work=Wall Street Journal|access-date=2017-05-14|last2=Grove|first2=Thomas|issn=0099-9660|last3=Gross|first3=Jenny}}</ref>
Kerentanan Windows bukanlah cacat [[zero-day (komputasi)|zero-day]], tapi satu di antaranya Microsoft menyediakan [[Tambalan (komputasi)|tambalan keamanan]] pada tanggal 14 Maret 2017,<ref name="microsoft.com" /> Hampir dua bulan sebelum serangan. Tambalan ke protokol Server Message Block (SMB) yang digunakan oleh Windows.<ref name=exploit>{{cite news|url=http://www.eweek.com/security/wannacry-ransomware-attack-hits-victims-with-microsoft-smb-exploit|title=WannaCry Ransomware Attack Hits Victims With Microsoft SMB Exploit|work=[[eWeek]]|access-date=13 May 2017}}</ref><ref name="hei">{{cite web|title=WannaCry: BSI ruft Betroffene auf, Infektionen zu melden|url=https://www.heise.de/newsticker/meldung/WannaCry-BSI-ruft-Betroffene-auf-Infektionen-zu-melden-3713442.html|publisher=heise online|accessdate=14 May 2017|language=de-DE}}</ref> Organisasi yang kekurangan tambalan keamanan ini terpengaruh karena alasan ini, walaupun sejauh ini tidak ada bukti bahwa ada yang secara khusus ditargetkan oleh pengembang perangkat pemeras.<ref name=exploit /> Setiap organisasi masih menjalankan [[Windows XP]] lama<ref name=vicexp>{{cite web|url=https://motherboard.vice.com/en_us/article/nhs-hospitals-are-running-thousands-of-computers-on-unsupported-windows-xp|title=NHS Hospitals Are Running Thousands of Computers on Unsupported Windows XP|website=Motherboard|access-date=13 May 2017}}</ref> sangat berisiko tinggi karena sampai 13 Mei,<ref name="microsoftreleases" /> tidak ada tambalan keamanan yang telah dirilis sejak April 2014.<ref>{{cite web|url=https://www.microsoft.com/en-gb/windowsforbusiness/end-of-xp-support|title=Windows XP End of Support|website=www.microsoft.com|access-date=13 May 2017}}</ref> Setelah serangan tersebut, Microsoft merilis tambalan keamanan untuk Windows XP.<ref name="microsoftreleases" />
Menurut ''[[Wired (majalah)|Wired]]'', sistem yang terkena dampak juga akan dipasang backdoor
Menurut laporan, tiga atau lebih alamat [[kode keras]] bitcoin, atau "dompet", digunakan untuk menerima korban pembayaran. Seperti semua dompet itu, transaksi dan saldo mereka bisa diakses publik bukan pemilik dompetnya. Untuk melacak pembayaran tebusan secara waktu, sebenarnya [[Twitterbot]] yang mengawasi masing-masing dari ketiga dompet ini telah disiapkan.<ref>{{cite web|last1=Collins|first1=Keith|title=Watch as these bitcoin wallets receive ransomware payments from the global cyberattack|url=https://qz.com/982993/watch-as-these-bitcoin-wallets-receive-ransomware-payments-from-the-ongoing-cyberattack/|publisher=Quartz|accessdate=14 May 2017}}</ref> Pada 14 Mei 2017 total $33.319,59 telah dibayarkan.
== Varian ==
Pada tanggal 14 Mei, dua varian tambahan terdeteksi. Salah satu varian ini memiliki kill switch baru yang segera terdaftar, sementara yang lainnya tidak memiliki kill switch namun memiliki muatan rusak yang mencegah enkripsi berkas.<ref>{{Cite web|url=https://blog.comae.io/wannacry-new-variants-detected-b8908fefea7e|title=WannaCry — New Variants Detected!|website=blog.comae.io|access-date=2017-05-16|archive-date=2017-05-15|archive-url=https://web.archive.org/web/20170515115119/https://blog.comae.io/wannacry-new-variants-detected-b8908fefea7e|dead-url=yes}}</ref>
== Dampak ==
Baris 87 ⟶ 84:
Dampak serangan bisa jadi jauh lebih buruk jika tidak ada kill-switch yang dibangun oleh pencipta malware tersebut.<ref>{{cite web|title=Lucky break slows global cyberattack; what's coming could be worse|url=http://www.chicagotribune.com/news/nationworld/ct-nsa-cyberattacks-20170513-story.html|accessdate=14 May 2017}}</ref><ref name=guard1>{{cite web|last1=Helmore|first1=Edward|title=Ransomware attack reveals breakdown in US intelligence protocols, expert says|url=https://www.theguardian.com/technology/2017/may/13/ransomware-cyber-attack-us-intelligence|publisher=The Guardian|accessdate=14 May 2017|date=13 May 2017}}</ref>
Ahli keamanan Cybersecurity Ori Eisen mengatakan bahwa serangan tersebut tampaknya merupakan barang "tingkat rendah", dengan tuntutan uang tebusan sebesar $300 dan menyatakan bahwa hal yang sama dapat dilakukan pada [[Infrastruktur kritis|infrastruktur penting]], seperti [[Keselamatan dan keamanan nuklir|pembangkit tenaga nuklir]], bendungan atau sistem kereta api.<ref>{{cite web|title=The Latest: Researcher who helped halt cyberattack applauded|url=http://www.startribune.com/the-latest-turkey-among-countries-hit-in-cyberattack/422161813/|publisher=Star Tribune|accessdate=14 May 2017|archive-date=2017-05-16|archive-url=https://web.archive.org/web/20170516182233/http://www.startribune.com/the-latest-turkey-among-countries-hit-in-cyberattack/422161813/|dead-url=yes}}</ref>
Microsoft juga telah merilis tambalan untuk memperbaiki eksploitasi yang digunakan oleh perangkat pemeras pada sistem operasi Windows XP, tandingan 64-bit, Windows Server 2003, dan Windows 8, meskipun semuanya tidak didukung selama masa itu.
Baris 96 ⟶ 93:
Please don't entries in here without a reference to a Reliable Source
-->
Dalam urutan abjad:
{{columns-list|colwidth=30em|▼
* {{flagicon|Brazil}} São Paulo Court of Justice<ref name="auto1">{{cite web|url=http://www.opovo.com.br/jornal/economia/2017/05/wannacry-no-brasil-e-no-mundo.html|title=WannaCry no Brasil e no mundo|date=13 May 2017|website=O Povo|language=pt|access-date=13 May 2017}}</ref>▼
* {{flagicon|Brazil}} [[Vivo (telecommunications)|Vivo]]<ref name="auto1" />▼
* {{flagicon|Canada}} [[Lakeridge Health]]<ref>{{cite web|url=https://www.thestar.com/news/canada/2017/05/13/ontario-health-ministry-on-high-alert-amid-global-cyberattack.html|title=Ontario health ministry on high alert amid global cyberattack – Toronto Star|website=thestar.com}}</ref>▼
* {{flagicon|China}} [[PetroChina]]<ref name="cnn99countries" />▼
* {{flagicon|China}} [[Sun Yat-sen University]]<ref name="misc" />▼
* {{flagicon|Colombia}} Instituto Nacional de Salud<ref>{{cite web |url=http://www.eltiempo.com/tecnosfera/novedades-tecnologia/alerta-por-cibertaque-que-golpeo-a-74-paises-87602|title=Instituto Nacional de Salud, entre víctimas de ciberataque mundial|date=13 May 2017}}</ref>▼
* {{flagicon|France}} [[Renault]]<ref>{{cite web|url=http://www.france24.com/en/20170512-cyberattack-ransomware-renault-worldwide-british-hospitals|title=France’s Renault hit in worldwide ‘ransomware’ cyber attack|date=13 May 2017|website=france24.com|language=es|access-date=13 May 2017}}</ref>▼
* {{flagicon|Germany}} [[Deutsche Bahn]]<ref>{{cite web|url=http://www.faz.net/aktuell/wirtschaft/unternehmen/hacker-angriff-weltweite-cyberattacke-trifft-computer-der-deutschen-bahn-15013583.html|title=Weltweite Cyberattacke trifft Computer der Deutschen Bahn|date=13 May 2017|website=faz.net|language=de|access-date=13 May 2017}}</ref>▼
* {{flagicon|Hungary}} [[Telenor Hungary]]<ref>{{cite news|last1=Balogh|first1=Csaba|title=Ideért a baj: Magyarországra is elért az óriási kibertámadás|url=http://hvg.hu/tudomany/20170512_wannacry_zsarolovirus_aldozatok_magyar_ceg|accessdate=13 May 2017|work=[[Heti Világgazdaság|HVG]]|date=12 May 2017|language=Hungarian}}</ref>▼
* {{flagicon|India}} [[Andhra Pradesh Police]]<ref>{{cite web|url=http://timesofindia.indiatimes.com/india/andhra-police-computers-hit-by-cyberattack/articleshow/58658853.cms|title=Andhra police computers hit by cyberattack|date=13 May 2017|website=Times of India|language=en|access-date=13 May 2017}}</ref>▼
* {{flagicon|Indonesia}} [[Rumah Sakit Dharmais]]<ref name="misc" />▼
* {{flagicon|Indonesia}} [[Rumah Sakit Harapan Kita]]<ref name="misc" />▼
* {{flagicon|Italy}} [[University of Milano-Bicocca]]<ref>{{cite web|url=http://milano.repubblica.it/cronaca/2017/05/12/news/milano_virus_ransomware_universita_bicocca-165302056/|title=Il virus Wannacry arrivato a Milano: colpiti computer dell'università Bicocca|date=12 May 2017|website=repubblica.it|language=it|access-date=13 May 2017}}</ref>▼
* {{flagicon|Netherlands}} [[Q-Park]]<ref>{{cite web|URL=http://www.nu.nl/internet/4691349/parkeerbedrijf-q-park-getroffen-ransomware-aanval.html|title=Parkeerbedrijf Q-Park getroffen door ransomware-aanval|date=13 May 2017|website=Nu.nl|language=nl|access-date=14 May 2017}}</ref>▼
* {{flagicon|Portugal}} [[Portugal Telecom]]<ref>{{cite web|url=http://observador.pt/2017/05/12/portugal-telecom-alvo-de-ataque-informatico-internacional/|title=PT Portugal alvo de ataque informático internacional|date=12 May 2017 | website=Observador | language=pt|access-date=13 May 2017}}</ref>▼
* {{flagicon|Romania}} [[Automobile Dacia]]<ref>{{ro icon}} {{cite web |url=http://stirileprotv.ro/stiri/actualitate/atacul-informatic-global-ar-fi-afectat-si-uzina-dacia-de-la-mioveni-reactia-ministrului-comunicatiilor-augustin-jianu.html |title=Atacul cibernetic global a afectat și Uzina Dacia de la Mioveni. Renault a anunțat că a oprit producția și în Franța |work=Pro TV |date=13 May 2017}}</ref>▼
* {{flagicon|Romania}} [[Ministry of Foreign Affairs (Romania)|Ministry of Foreign Affairs]]<ref>{{ro icon}} {{cite web |url=http://www.libertatea.ro/stiri/atac-cibernetic-la-mae-1836024 |title=UPDATE. Atac cibernetic la MAE. Cine sunt hackerii de elită care au falsificat o adresă NATO |work=Libertatea |date=12 May 2017}}</ref>▼
* {{flagicon|Russia}} [[MegaFon]]<ref>{{cite web|title=Massive cyber attack creates chaos around the world|url=http://www.news.com.au/technology/online/hacking/massive-cyber-attack-creates-chaos-around-the-world/news-story/b248da44b753489a3f207dfee2ce78a9|publisher=news.com.au|access-date=13 May 2017}}</ref>▼
* {{flagicon|Russia}} [[Ministry of Internal Affairs (Russia)|Ministry of Internal Affairs of the Russian Federation]]<ref>{{cite web|title=Researcher 'accidentally' stops spread of unprecedented global cyberattack|url=http://abcnews.go.com/International/researcher-accidentally-stops-spread-unprecedented-global-cyberattack/story?id=47390745|publisher=[[ABC News]]|access-date=13 May 2017}}</ref>▼
* {{flagicon|Russia}} [[Russian Railways]]<ref>{{cite web|title=Компьютеры РЖД подверглись хакерской атаке и заражены вирусом|url=https://www.svoboda.org/a/28483898.html|publisher=[[Radio Free Europe/Radio Liberty|Radio Liberty]]|access-date=13 May 2017}}</ref>▼
* {{flagicon|Chile}} [[LATAM Airlines Group]]<ref>{{cite web|title=LATAM Airlines también está alerta por ataque informático|url=https://www.fayerwayer.com/2017/05/latam-airlines-tambien-estaria-comprometida-en-ataque-ransomware/|publisher=[[Fayerwayer]]|access-date=13 May 2017}}</ref>▼
* {{flagicon|Spain}} [[Telefónica]]<ref name="spain">{{cite web|url=http://www.elperiodico.com/es/noticias/sociedad/ataque-informatico-masivo-infecta-las-grandes-empresas-espana-6033534|title=Un ataque informático masivo con 'ransomware' afecta a medio mundo|date=12 May 2017|website=elperiodico.com|language=es|access-date=13 May 2017}}</ref>▼
* {{flagicon|Sweden}} [[Sandvik]]<ref name="misc">{{cite web|url=http://www.straitstimes.com/world/organisations-hit-by-global-cyberattack|title=Global cyber attack: A look at some prominent victims|date=13 May 2017|website=elperiodico.com|language=es|access-date=14 May 2017}}</ref>▼
* {{flagicon|Sweden}} [[Timrå kommun]]<ref>{{cite news|url=https://www.svt.se/nyheter/inrikes/timra-kommun-drabbat-av-utpressningsattack|date=13 May 2017|work=[[Sveriges Television]]|title=Timrå kommun drabbat av utpressningsattack|language=sv|access-date=15 May 2017}}</ref>▼
* {{flagicon|Thailand}} Garena Blade and Soul<ref>{{cite web|url=https://www.blognone.com/node/92406|title=เซิร์ฟเวอร์เกม Blade & Soul ของ Garena ประเทศไทยถูก WannaCrypt โจมตี|date=13 May 2017|website=blognone.com|language=th|access-date=14 May 2017}}</ref>▼
* {{flagicon|United Kingdom}} [[National Health Service (England)|National Health Service]]<ref name="uk">{{cite web|url=http://www.independent.co.uk/news/uk/home-news/nissan-sunderland-cyber-attack-ransomware-nhs-malware-wannacry-car-factory-a7733936.html|title="Cyber-attack that crippled NHS systems hits Nissan car factory in Sunderland and Renault in France"|date=13 May 2017|website=The Independent|language=en|access-date=13 May 2017}}</ref><ref name="BBC news" /><ref name=guardian-nhs />▼
* {{flagicon|United Kingdom}} [[NHS Scotland]]<ref name="BBC news" /><ref name=guardian-nhs />▼
* {{flagicon|United Kingdom}} [[Nissan Motor Manufacturing UK]]<ref name="uk" />▼
* {{flagicon|United States}} [[FedEx]]<ref>{{cite web|url=https://www.ft.com/content/af74e3f4-373d-11e7-99bd-13beb0903fa3|title=What is Wannacry and how can it be stopped?|date=12 May 2017|website=Ft.com|language=en|access-date=13 May 2017}}</ref>▼
* {{flagicon|Saudi Arabia}} [[Saudi Telecom Company]]<ref>{{Cite tweet |user=AmjadShacker |author= Amjad Shacker |number= 863749329017868293 |date = 14 May 2017 |title=}}</ref>▼
* {{flagicon|South Korea}} [[CJ CGV]]<ref>{{cite news|title=Korean gov't computers safe from WannaCry attack|url=http://www.koreaherald.com/view.php?ud=20170515000574|accessdate=15 May 2017|work=The Korea Herald}}</ref>▼
▲*
▲*
* [[Cambrian College]], Kanada<ref>{{cite news|url=http://www.cbc.ca/news/canada/sudbury/cambrian-college-ransomware-hack-1.4093634|title=Hackers demand $54K in Cambrian College ransomware attack|work=[[CBC.ca]]|accessdate=16 May 2017}}</ref>
* [[Chinese public security bureau]]<ref name="scmp">{{Cite news|url=http://www.scmp.com/news/china/society/article/2094291/chinese-police-and-petrol-stations-hit-ransomware-attack|title=Chinese police and petrol stations hit by ransomware attack|author=Mimi Lau|work=South China Morning Post|date=14 May 2017|access-date=15 May 2017|language=en}}</ref>
▲*
▲*
* [[Faculty Hospital, Nitra]], Slovenia<ref name="nitra">{{cite web|url=https://www.etrend.sk/ekonomika/hackersky-utok-zasiahol-aj-fakultnu-nemocnicu-v-nitre.html|title=Hackerský útok zasiahol aj Fakultnú nemocnicu v Nitre|date=15 May 2017|website=etrend.sk|language=sk|access-date=15 May 2017}}</ref>
▲*
▲*
* [[Hitachi]]<ref>{{cite news|url=http://www3.nhk.or.jp/news/html/20170515/k10010981821000.html?utm_int=detail_contents_news-related-auto_002|title=日立製作所 サイバー攻撃で社内システム一部に障害|language=ja|website=NHK News Web|date=15 May 2017|accessdate=15 May 2017|archive-date=2017-05-16|archive-url=https://web.archive.org/web/20170516055522/http://www3.nhk.or.jp/news/html/20170515/k10010981821000.html?utm_int=detail_contents_news-related-auto_002|dead-url=yes}}</ref>
▲*
▲*
▲*
▲*
▲*
▲*
▲*
* Pemerintah Negara Bagian India
** [[Pemerintah Gujarat]]<ref name="auto2"/>
** [[Pemerintah Kerala]]<ref name="auto2">{{cite news|title=Ransomware WannaCry Surfaces In Kerala, Bengal: 10 Facts|url=http://www.ndtv.com/india-news/ransomware-wannacry-surfaces-in-kerala-bengal-10-facts-1693806|accessdate=15 May 2017|work=New Delhi Television Limited (NDTV)}}</ref>
** [[Pemerintah Maharashtra]]<ref>{{cite news|author1=Sanjana Nambiar|title=Hit by WannaCry ransomware, civic body in Mumbai suburb to take 3 more days to fix computers|url=http://www.hindustantimes.com/mumbai-news/hit-by-wannacry-ransomware-civic-body-in-mumbai-suburb-to-take-3-more-days-to-fix-computers/story-eSIMZQ2NFT217erJAFkS0J.html|accessdate=17 May 2017|work=[[Hindustn Times]]|date=16 May 2017|language=en}}</ref>
** [[Pemerintah Benggala Barat]]<ref name="auto2"/>
▲*
▲*
▲*
▲*
▲*
▲*
▲*
* [[Sberbank]]<ref name=vidal/>
▲*
▲*
▲*
* [[Universitas Jember]], Indonesia<ref>{{Cite news|url=https://m.tempo.co/read/news/2017/05/16/058875604/virus-ransomware-wannacry-serang-perpustakaan-universitas-jember|title=Virus Ransomware WannaCry Serang Perpustakaan Universitas Jember|date=16 May 2017|work=[[Tempo.co]]|language=id|access-date=17 May 2017|editor-last=Baiduri|editor-first=MC Nieke Indrietta}}</ref>
▲*
* [[University of Montréal]], Kanada<ref>{{cite news|title=Some University of Montreal computers hit with WannaCry virus|url=http://www.theglobeandmail.com/news/national/universite-de-montreal-computers-hit-with-wannacry-virus/article35004991/|accessdate=16 May 2017|work=The Globe and Mail|date=May 16, 2017}}</ref>
== Referensi ==
{{Reflist|30em}}
[[Kategori:
|