Serangan perangkat pemeras WannaCry: Perbedaan antara revisi

Konten dihapus Konten ditambahkan
Ilzhabimantara (bicara | kontrib)
InternetArchiveBot (bicara | kontrib)
Rescuing 1 sources and tagging 0 as dead.) #IABot (v2.0.9.2
 
(36 revisi perantara oleh 18 pengguna tidak ditampilkan)
Baris 1:
{{merge from|WannaCry|date=Mei 2017}}
{{rough translation|1=en|listed=yes|date=Mei 2017}}
{{expand language|topic=|langcode=en|otherarticle=WannaCry cyber attack|date=Mei 2017}}
{{current|date=Mei 2017}}
{{Infobox event
| title = Serangan perangkat pemeras WannaCry
| image = Wana Decrypt0r screenshot.png
| image_size =
| image_alt =
| caption = Cuplikan layar perangkatdari dekripsi,uang Wanatebusan Decrypt0rtertinggal 2.0.pada sistem yang terinfeksi
| english_name =
| time =
| duration =
| date = {{start date|2017|5|12}} – sekarang{{end date|2017|5|15}}
| location = Seluruh dunia
| also_known_as = WannaCrypt, WanaCrypt0r., WCRY
| type = [[Serangan siber]] dengan perangkat tebusan
| theme = Perangkat pemeras mengenkripsi diska keras dengan permintaan $300 – $600
Baris 48 ⟶ 45:
}}
 
'''Serangan perangkat pemeras WannaCry''' adalah sebuah perangkat tebusan. Pada Mei 2017, serangan siber skala besar menggunakan perangkat ini diluncurkan, menginfeksi lebih dari 75.000 komputer di 99 negara, menuntut pembayaran tebusan dalam 20 bahasa.
'''Serangan perangkat pemeras WannaCry''' (atau '''WannaCrypt''',<ref name="microsoftreleases">{{cite web|last1=MSRC Team|title=Customer Guidance for WannaCrypt attacks|url=https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/|publisher=[[Microsoft]]|access-date=13 May 2017}}</ref> '''WanaCrypt0r 2.0''',<ref>{{cite web|author1=Jakub Kroustek|title=Avast reports on WanaCrypt0r 2.0 ransomware that infected NHS and Telefonica.|url=https://blog.avast.com/ransomware-that-infected-telefonica-and-nhs-hospitals-is-spreading-aggressively-with-over-50000-attacks-so-far-today|website=Avast Security News|publisher=Avast Software, Inc|date=12 May 2017}}</ref><ref name=":0">{{Cite news|url=https://www.forbes.com/sites/thomasbrewster/2017/05/12/nsa-exploit-used-by-wannacry-ransomware-in-global-explosion/|title=An NSA Cyber Weapon Might Be Behind A Massive Global Ransomware Outbreak|last=Fox-Brewster|first=Thomas|work=Forbes|access-date=12 May 2017}}</ref> '''Wanna Decryptor'''<ref name="auto">{{Cite news|url=http://www.wired.co.uk/article/wanna-decryptor-ransomware|title=Wanna Decryptor: what is the 'atom bomb of ransomware' behind the NHS attack?|last=Woollaston|first=Victoria|work=WIRED UK|access-date=2017-05-13|language=en-GB}}</ref>) adalah sebuah perangkat tebusan. Pada Mei 2017, serangan siber skala besar menggunakan perangkat ini diluncurkan, menginfeksi lebih dari 75.000 komputer di 99 negara, menuntut pembayaran tebusan dalam 20 bahasa.
 
Serangan ini mengenai [[Telefónica]] dan beberapa perusahaan besar lainnya di Spanyol, serta sebagai dari  [[National Health Service]] (NHS),<ref>{{Cite web|url=https://www.theguardian.com/society/2017/may/12/global-cyber-attack-nhs-trusts-malware|title=The NHS trusts hit by malware – full list|last=Marsh|first=Sarah|date=12 May 2017|access-date=12 May 2017}}</ref> [[FedEx]] dan [[Deutsche Bahn]].<ref name="BBC news">{{Cite news|url=http://www.bbc.co.uk/news/health-39899646|title=NHS cyber-attack: GPs and hospitals hit by ransomware|date=2017-05-12|work=BBC News|language=en-GB|access-date=2017-05-12}} CS1 maint: Unrecognized language ([[:Kategori:CS1 maint: Unrecognized language|link]])
</ref><ref>{{Cite news|url=https://www.theguardian.com/technology/2017/may/12/nhs-ransomware-cyber-attack-what-is-wanacrypt0r-20|title=What is 'WanaCrypt0r 2.0' ransomware and why is it attacking the NHS?|last=Hern|first=Alex|date=2017-05-12|work=The Guardian|last2=Gibbs|first2=Samuel|language=en-GB|issn=0261-3077|access-date=2017-05-12}} CS1 maint: Unrecognized language ([[:Kategori:CS1 maint: Unrecognized language|link]])
</ref><ref>{{Cite web|url=https://digital.nhs.uk/article/1491/Statement-on-reported-NHS-cyber-attack|title=Statement on reported NHS cyber attack|website=digital.nhs.uk|language=en-GB|access-date=2017-05-12}} CS1 maint: Unrecognized language ([[:Kategori:CS1 maint: Unrecognized language|link]])
Baris 56 ⟶ 53:
</ref><ref name="cnn99countries">{{Cite news|url=http://money.cnn.com/2017/05/12/technology/ransomware-attack-nsa-microsoft/|title=Massive ransomware attack hits 99 countries|last=Larson|first=Selena|date=2017-05-12|work=CNN|access-date=2017-05-12}}</ref> Lebih dari 1.000 komputer di [[Kementerian Urusan Dalam Negeri (Rusia)|Kementerian Urusan Dalam Negeri Rusia]], Kementerian Darurat Rusia dan perusahaan telekomunikasi Rusia [[MegaFon]], telah dilaporkan terinfeksi.<ref name=":2">{{Cite news|url=https://www.rt.com/news/388153-thousands-ransomeware-attacks-worldwide/|title=Ransomware virus plagues 75k computers across 99 countries|work=RT International|language=en-US|access-date=2017-05-12}}</ref>
 
WannaCry diyakini menggunakan  [[exploit]]  EternalBlue, diduga dikembangkan oleh  [[Badan Keamanan Nasional]] Amerika Serikat untuk menyerang komputer yang menjalankan sistem operasi  [[Microsoft Windows]].<ref>{{Cite web|url=http://money.cnn.com/2017/05/12/technology/ransomware-attack-nsa-microsoft/index.html|title=Massive ransomware attack hits 74 countries|last=Larson|first=Selena|date=2017-05-12|website=CNNMoney|access-date=2017-05-12}}</ref> Meskipun tambalan untuk mengatasi kerentanan ini telah dikeluarkan pada tanggal 14 Maret 2017, keterlambatan dalam penerapan pembaruan keamanan membuat beberapa pengguna dan organisasi tetap dalam kondisi rentan.
Di Indonesia, perangkat ini menyerang sejumlah komputer di berbagai rumah sakit umum dengan permintaan uang tebusan Rp 4.000.000 untuk mengembalikan komputer ke sediakala.
<ref>{{Cite web|url=https://www.theregister.co.uk/2017/05/12/spain_ransomware_outbreak/|title=WanaCrypt ransomware snatches NSA exploit, fscks over Telefónica, other orgs in Spain|last=15:58|first=12 May 2017 at|last2=tweet_btn()|first2=John Leyden|website=theregister.co.uk|access-date=12 May 2017}}</ref>
 
== Latar belakang ==
Vektor infeksi yang diklaim, [[EternalBlue]], dirilis oleh kelompok peretas [[The Shadow Brokers]] pada tanggal 14 April 2017<ref>{{cite news|url=http://www.reuters.com/article/2015/02/16/us-usa-cyberspying-idUSKBN0LK1QV20150216|title=Russian researchers expose breakthrough U.S. spying program|last=Menn|first=Joseph|date=17 February 2015 |publisher=[[Reuters]]|access-date=24 November 2015|archive-date=2015-09-24|archive-url=https://web.archive.org/web/20150924213439/http://www.reuters.com/article/2015/02/16/us-usa-cyberspying-idUSKBN0LK1QV20150216|dead-url=yes}}</ref><ref name="Ars Technica">{{Cite news|url=https://arstechnica.com/security/2017/04/nsa-leaking-shadow-brokers-just-dumped-its-most-damaging-release-yet/|title=NSA-leaking Shadow Brokers just dumped its most damaging release yet|work=Ars Technica|access-date=15 April 2017|language=en-us}}</ref> bersama dengan alat lain yang tampaknya bocor dari [[Equation Group]], diyakini merupakan bagian dari [[Badan Keamanan Nasional]] [[Amerika Serikat]].
 
EternalBlue memanfaatkan kerentanan MS17-010<ref name="microsoft.com">{{cite web|url=https://technet.microsoft.com/en-us/library/security/ms17-010.aspx|title=Microsoft Security Bulletin MS17-010 – Critical|website=technet.microsoft.com|access-date=13 May 2017}}</ref> dalam implementasi protokol [[Server Message Block]] (SMB) [[Microsoft]]. Microsoft telah merilis sebuah "critical" advisory, bersamaan dengan pembaruan tambalan untuk mengatasi kerentanan sebulan sebelumnya, pada tanggal 14 Maret 2017.<ref name="microsoft.com" /> Tambalan ini memperbaiki beberapa versi workstation dari sistem operasi [[Microsoft Windows]], termasuk [[Windows Vista]] dan [[Windows 8.1]], serta versi server dan embedded seperti [[Windows Server 2008]] dan [[Windows Embedded POSReady 2009]], namun bukan [[Windows XP]] yang lebih tua, menurut Microsoft.<ref name="microsoft.com" />
 
Mulai 21 April 2017, periset keamanan mulai melaporkan bahwa komputer dengan [[backdoor]] [[DoublePulsar]] terpasang berada di puluhan ribu.<ref>{{Cite news|url=https://arstechnica.com/security/2017/04/10000-windows-computers-may-be-infected-by-advanced-nsa-backdoor/|title=>10,000 Windows computers may be infected by advanced NSA backdoor|last=Goodin|first=Dan|work=ARS Technica|access-date=2017-05-14|language=en-US}}</ref> Pada 25 April, laporan memperkirakan jumlah komputer yang terinfeksi bisa mencapai beberapa ratus ribu, dengan jumlah bervariasi antara 55.000 sampai hampir 200.000, tumbuh setiap hari.<ref>{{Cite news|url=https://arstechnica.com/security/2017/04/nsa-backdoor-detected-on-55000-windows-boxes-can-now-be-remotely-removed/|title=NSA backdoor detected on >55,000 Windows boxes can now be remotely removed|last=Goodin|first=Dan|work=ARS Technica|access-date=2017-05-14|language=en-US}}</ref><ref>{{Cite news|url=http://www.silicon.co.uk/security/nsa-malware-security-210253|title=NSA Malware 'Infects Nearly 200,000 Systems'|last=Broersma|first=Matthew|work=Silicon|access-date=2017-05-14|language=en-US}}</ref>
 
== Serangan siber ==
[[FileBerkas:Countries initially affected in WannaCry ransomware attack.pngsvg|thumbal=|jmpl|Negara awalnya terpengaruh<ref>{{cite web|url=http://www.bbc.com/news/world-europe-39907965|title=Cyber-attack: Europol says it was unprecedented in scale|date=13 May 2017|publisher=|via=www.bbc.com}}</ref>]]
Pada tanggal 12 Mei 2017, WannaCry mulai mempengaruhi komputer di seluruh dunia.<ref>{{cite web|last1=Newman|first1=Lily Hay|title=The Ransomware Meltdown Experts Warned About Is Here|url=https://www.wired.com/2017/05/ransomware-meltdown-experts-warned/|website=Wired.com|access-date=13 May 2017}}</ref> Infeksi awal mungkin disebabkan oleh kerentanan pertahanan jaringan atau [[Pengelabuan|serangan pengelabuan tombak]] yang sangat bagus.<ref>{{Cite news|url=https://arstechnica.com/security/2017/05/an-nsa-derived-ransomware-worm-is-shutting-down-computers-worldwide/|title=An NSA-derived ransomware worm is shutting down computers worldwide|last=Goodin|first=Dan|work=ARS Technica|access-date=2017-05-14|language=en-US}}</ref> Saat dieksekusi, malware pertama kali memeriksa "kill switch" [[nama domain]]. Jika tidak ditemukan, maka ransomware mengenkripsi data komputer,<ref name=":1">{{Cite news|url=http://www.telegraph.co.uk/news/2017/05/12/russian-linked-cyber-gang-shadow-brokers-blamed-nhs-computer/|title=Russian-linked cyber gang blamed for NHS computer hack using bug stolen from US spy agency|work=The Telegraph|access-date=12 May 2017|language=en-GB}}</ref><ref name=syma /><ref>{{Cite news|url=https://www.nytimes.com/2017/05/12/world/europe/uk-national-health-service-cyberattack.html|title=Hackers Hit Dozens of Countries Exploiting Stolen N.S.A. Tool|last=Bilefsky|first=Dan|date=12 May 2017|work=The New York Times|access-date=12 May 2017|last2=Perlroth|first2=Nicole|issn=0362-4331}}</ref> kemudian mencoba untuk memanfaatkan kerentanan SMB untuk menyebar ke komputer acak di Internet,<ref name=mbytes>{{cite web|last1=Clark|first1=Zammis|title=The worm that spreads WanaCrypt0r|url=https://blog.malwarebytes.com/threat-analysis/2017/05/the-worm-that-spreads-wanacrypt0r/|website=Malwarebytes Labs|publisher=malwarebytes.com|access-date=13 May 2017}}</ref> dan "lateral" ke komputer pada [[Jaringan wilayaharea lokal]] yang sama.<ref>{{cite web|last1=Samani|first1=Raj|title=An Analysis of the WANNACRY Ransomware outbreak|url=https://securingtomorrow.mcafee.com/executive-perspectives/analysis-wannacry-ransomware-outbreak/|publisher=McAfee|access-date=13 May 2017|archive-date=2017-05-13|archive-url=https://web.archive.org/web/20170513130044/https://securingtomorrow.mcafee.com/executive-perspectives/analysis-wannacry-ransomware-outbreak/|dead-url=yes}}</ref> Seperti pada perangkat pemeras modern lainnya, muatan menampilkan pesan yang menginformasikan pengguna bahwa file telah dienkripsi, dan menuntut pembayaran sekitar $300 dalam [[bitcoin]] dalam tiga hari atau $600 dalam waktu tujuh hari.<ref name=syma>{{cite web|title=What you need to know about the WannaCry Ransomware|url=https://www.symantec.com/connect/blogs/what-you-need-know-about-wannacry-ransomware|publisher=Symantec Security Response|accessdate=14 May 2017}}</ref><ref>{{Cite news|url=https://www.wsj.com/articles/more-cyberattack-victims-emerge-as-agencies-search-for-clues-1494671938|title=More Cyberattack Victims Emerge as Agencies Search for Clues|last=Thomas|first=Andrea|date=2017-05-13|work=Wall Street Journal|access-date=2017-05-14|last2=Grove|first2=Thomas|issn=0099-9660|last3=Gross|first3=Jenny}}</ref>
 
Pada tanggal 12 Mei 2017, WannaCry mulai mempengaruhi komputer di seluruh dunia.<ref>{{cite web|last1=Newman|first1=Lily Hay|title=The Ransomware Meltdown Experts Warned About Is Here|url=https://www.wired.com/2017/05/ransomware-meltdown-experts-warned/|website=Wired.com|access-date=13 May 2017}}</ref> Infeksi awal mungkin disebabkan oleh kerentanan pertahanan jaringan atau [[Pengelabuan|serangan pengelabuan tombak]] yang sangat bagus.<ref>{{Cite news|url=https://arstechnica.com/security/2017/05/an-nsa-derived-ransomware-worm-is-shutting-down-computers-worldwide/|title=An NSA-derived ransomware worm is shutting down computers worldwide|last=Goodin|first=Dan|work=ARS Technica|access-date=2017-05-14|language=en-US}}</ref> Saat dieksekusi, malware pertama kali memeriksa "kill switch" [[nama domain]]. Jika tidak ditemukan, maka ransomware mengenkripsi data komputer,<ref name=":1">{{Cite news|url=http://www.telegraph.co.uk/news/2017/05/12/russian-linked-cyber-gang-shadow-brokers-blamed-nhs-computer/|title=Russian-linked cyber gang blamed for NHS computer hack using bug stolen from US spy agency|work=The Telegraph|access-date=12 May 2017|language=en-GB}}</ref><ref name=syma /><ref>{{Cite news|url=https://www.nytimes.com/2017/05/12/world/europe/uk-national-health-service-cyberattack.html|title=Hackers Hit Dozens of Countries Exploiting Stolen N.S.A. Tool|last=Bilefsky|first=Dan|date=12 May 2017|work=The New York Times|access-date=12 May 2017|last2=Perlroth|first2=Nicole|issn=0362-4331}}</ref> kemudian mencoba untuk memanfaatkan kerentanan SMB untuk menyebar ke komputer acak di Internet,<ref name=mbytes>{{cite web|last1=Clark|first1=Zammis|title=The worm that spreads WanaCrypt0r|url=https://blog.malwarebytes.com/threat-analysis/2017/05/the-worm-that-spreads-wanacrypt0r/|website=Malwarebytes Labs|publisher=malwarebytes.com|access-date=13 May 2017}}</ref> dan "lateral" ke komputer pada [[Jaringan wilayah lokal]] yang sama.<ref>{{cite web|last1=Samani|first1=Raj|title=An Analysis of the WANNACRY Ransomware outbreak|url=https://securingtomorrow.mcafee.com/executive-perspectives/analysis-wannacry-ransomware-outbreak/|publisher=McAfee|access-date=13 May 2017}}</ref> Seperti pada perangkat pemeras modern lainnya, muatan menampilkan pesan yang menginformasikan pengguna bahwa file telah dienkripsi, dan menuntut pembayaran sekitar $300 dalam [[bitcoin]] dalam tiga hari atau $600 dalam waktu tujuh hari.<ref name=syma>{{cite web|title=What you need to know about the WannaCry Ransomware|url=https://www.symantec.com/connect/blogs/what-you-need-know-about-wannacry-ransomware|publisher=Symantec Security Response|accessdate=14 May 2017}}</ref><ref>{{Cite news|url=https://www.wsj.com/articles/more-cyberattack-victims-emerge-as-agencies-search-for-clues-1494671938|title=More Cyberattack Victims Emerge as Agencies Search for Clues|last=Thomas|first=Andrea|date=2017-05-13|work=Wall Street Journal|access-date=2017-05-14|last2=Grove|first2=Thomas|issn=0099-9660|last3=Gross|first3=Jenny}}</ref>
 
Kerentanan Windows bukanlah cacat [[zero-day (komputasi)|zero-day]], tapi satu di antaranya Microsoft menyediakan [[Tambalan (komputasi)|tambalan keamanan]] pada tanggal 14 Maret 2017,<ref name="microsoft.com" /> Hampir dua bulan sebelum serangan. Tambalan ke protokol Server Message Block (SMB) yang digunakan oleh Windows.<ref name=exploit>{{cite news|url=http://www.eweek.com/security/wannacry-ransomware-attack-hits-victims-with-microsoft-smb-exploit|title=WannaCry Ransomware Attack Hits Victims With Microsoft SMB Exploit|work=[[eWeek]]|access-date=13 May 2017}}</ref><ref name="hei">{{cite web|title=WannaCry: BSI ruft Betroffene auf, Infektionen zu melden|url=https://www.heise.de/newsticker/meldung/WannaCry-BSI-ruft-Betroffene-auf-Infektionen-zu-melden-3713442.html|publisher=heise online|accessdate=14 May 2017|language=de-DE}}</ref> Organisasi yang kekurangan tambalan keamanan ini terpengaruh karena alasan ini, walaupun sejauh ini tidak ada bukti bahwa ada yang secara khusus ditargetkan oleh pengembang perangkat pemeras.<ref name=exploit /> Setiap organisasi masih menjalankan [[Windows XP]] lama<ref name=vicexp>{{cite web|url=https://motherboard.vice.com/en_us/article/nhs-hospitals-are-running-thousands-of-computers-on-unsupported-windows-xp|title=NHS Hospitals Are Running Thousands of Computers on Unsupported Windows XP|website=Motherboard|access-date=13 May 2017}}</ref> sangat berisiko tinggi karena sampai 13 Mei,<ref name="microsoftreleases" /> tidak ada tambalan keamanan yang telah dirilis sejak April 2014.<ref>{{cite web|url=https://www.microsoft.com/en-gb/windowsforbusiness/end-of-xp-support|title=Windows XP End of Support|website=www.microsoft.com|access-date=13 May 2017}}</ref> Setelah serangan tersebut, Microsoft merilis tambalan keamanan untuk Windows XP.<ref name="microsoftreleases" />
Baris 79 ⟶ 75:
 
== Varian ==
Pada tanggal 14 Mei, dua varian tambahan terdeteksi. Salah satu varian ini memiliki kill switch baru yang segera terdaftar, sementara yang lainnya tidak memiliki kill switch namun memiliki muatan rusak yang mencegah enkripsi berkas.<ref>{{Cite web|url=https://blog.comae.io/wannacry-new-variants-detected-b8908fefea7e|title=WannaCry — New Variants Detected!|website=blog.comae.io|access-date=2017-05-16|archive-date=2017-05-15|archive-url=https://web.archive.org/web/20170515115119/https://blog.comae.io/wannacry-new-variants-detected-b8908fefea7e|dead-url=yes}}</ref>
 
== Dampak ==
Baris 88 ⟶ 84:
Dampak serangan bisa jadi jauh lebih buruk jika tidak ada kill-switch yang dibangun oleh pencipta malware tersebut.<ref>{{cite web|title=Lucky break slows global cyberattack; what's coming could be worse|url=http://www.chicagotribune.com/news/nationworld/ct-nsa-cyberattacks-20170513-story.html|accessdate=14 May 2017}}</ref><ref name=guard1>{{cite web|last1=Helmore|first1=Edward|title=Ransomware attack reveals breakdown in US intelligence protocols, expert says|url=https://www.theguardian.com/technology/2017/may/13/ransomware-cyber-attack-us-intelligence|publisher=The Guardian|accessdate=14 May 2017|date=13 May 2017}}</ref>
 
Ahli keamanan Cybersecurity Ori Eisen mengatakan bahwa serangan tersebut tampaknya merupakan barang "tingkat rendah", dengan tuntutan uang tebusan sebesar $300 dan menyatakan bahwa hal yang sama dapat dilakukan pada [[Infrastruktur kritis|infrastruktur penting]], seperti [[Keselamatan dan keamanan nuklir|pembangkit tenaga nuklir]], bendungan atau sistem kereta api.<ref>{{cite web|title=The Latest: Researcher who helped halt cyberattack applauded|url=http://www.startribune.com/the-latest-turkey-among-countries-hit-in-cyberattack/422161813/|publisher=Star Tribune|accessdate=14 May 2017|archive-date=2017-05-16|archive-url=https://web.archive.org/web/20170516182233/http://www.startribune.com/the-latest-turkey-among-countries-hit-in-cyberattack/422161813/|dead-url=yes}}</ref>
 
Microsoft juga telah merilis tambalan untuk memperbaiki eksploitasi yang digunakan oleh perangkat pemeras pada sistem operasi Windows XP, tandingan 64-bit, Windows Server 2003, dan Windows 8, meskipun semuanya tidak didukung selama masa itu.
Baris 102 ⟶ 98:
* [[Andhra Pradesh Police]], India<ref>{{cite web|url=http://timesofindia.indiatimes.com/india/andhra-police-computers-hit-by-cyberattack/articleshow/58658853.cms|title=Andhra police computers hit by cyberattack|date=13 May 2017|website=The Times of India|language=en|access-date=13 May 2017}}</ref>
* [[Automobile Dacia]]<ref>{{cite web |url=http://stirileprotv.ro/stiri/actualitate/atacul-informatic-global-ar-fi-afectat-si-uzina-dacia-de-la-mioveni-reactia-ministrului-comunicatiilor-augustin-jianu.html |title=Atacul cibernetic global a afectat și Uzina Dacia de la Mioveni. Renault a anunțat că a oprit producția și în Franța |work=Pro TV |date=13 May 2017 |language=ro}}</ref>
* [[Cambrian College]], CanadaKanada<ref>{{cite news|url=http://www.cbc.ca/news/canada/sudbury/cambrian-college-ransomware-hack-1.4093634|title=Hackers demand $54K in Cambrian College ransomware attack|work=[[CBC.ca]]|accessdate=16 May 2017}}</ref>
* [[Chinese public security bureau]]<ref name="scmp">{{Cite news|url=http://www.scmp.com/news/china/society/article/2094291/chinese-police-and-petrol-stations-hit-ransomware-attack|title=Chinese police and petrol stations hit by ransomware attack|author=Mimi Lau|work=South China Morning Post|date=14 May 2017|access-date=15 May 2017|language=en}}</ref>
* [[CJ CGV]]<ref>{{cite news|title=Korean gov't computers safe from WannaCry attack|url=http://www.koreaherald.com/view.php?ud=20170515000574|accessdate=15 May 2017|newspaper=[[The Korea Herald]]}}</ref>
Baris 109 ⟶ 105:
* [[FedEx]]<ref>{{cite web|url=https://www.ft.com/content/af74e3f4-373d-11e7-99bd-13beb0903fa3|title=What is Wannacry and how can it be stopped?|date=12 May 2017|newspaper=[[Financial Times]]|language=en|access-date=13 May 2017}}</ref>
* Garena Blade and Soul<ref>{{cite web|url=https://www.blognone.com/node/92406|title=เซิร์ฟเวอร์เกม Blade & Soul ของ Garena ประเทศไทยถูก WannaCrypt โจมตี|date=13 May 2017|publisher=blognone.com|language=th|access-date=14 May 2017}}</ref>
* [[Hitachi]]<ref>{{cite news|url=http://www3.nhk.or.jp/news/html/20170515/k10010981821000.html?utm_int=detail_contents_news-related-auto_002|title=日立製作所 サイバー攻撃で社内システム一部に障害|language=ja|website=NHK News Web|date=15 May 2017|accessdate=15 May 2017|archive-date=2017-05-16|archive-url=https://web.archive.org/web/20170516055522/http://www3.nhk.or.jp/news/html/20170515/k10010981821000.html?utm_int=detail_contents_news-related-auto_002|dead-url=yes}}</ref>
* Instituto Nacional de Salud, [[ColombiaKolombia]]<ref>{{cite web |url=http://www.eltiempo.com/tecnosfera/novedades-tecnologia/alerta-por-cibertaque-que-golpeo-a-74-paises-87602|title=Instituto Nacional de Salud, entre víctimas de ciberataque mundial|date=13 May 2017|work=El Tiempo|language=Spanish}}</ref>
* [[MinistryKementerian ofDalam Internal AffairsNegeri (RussiaRusia)|Ministry of Internal AffairsKementerian ofDalam theNegeri RussianFederasi FederationRusia]]<ref>{{cite web|title=Researcher 'accidentally' stops spread of unprecedented global cyberattack|url=http://abcnews.go.com/International/researcher-accidentally-stops-spread-unprecedented-global-cyberattack/story?id=47390745|publisher=[[ABC News]]|access-date=13 May 2017}}</ref>
* [[MinistryKementerian of Foreign Affairs (Romania)|Ministry of Foreign AffairsLuar Negeri (RomaniaRumania)]]<ref>{{cite web |url=http://www.libertatea.ro/stiri/atac-cibernetic-la-mae-1836024 |title=UPDATE. Atac cibernetic la MAE. Cine sunt hackerii de elită care au falsificat o adresă NATO |work=Libertatea |date=12 May 2017 |language=ro}}</ref>
* [[Lakeridge Health]]<ref>{{cite web|url=https://www.thestar.com/news/canada/2017/05/13/ontario-health-ministry-on-high-alert-amid-global-cyberattack.html|title=Ontario health ministry on high alert amid global cyberattack|website=Toronto Star}}</ref>
* [[LATAM Airlines Group]]<ref>{{cite web|title=LATAM Airlines también está alerta por ataque informático|url=https://www.fayerwayer.com/2017/05/latam-airlines-tambien-estaria-comprometida-en-ataque-ransomware/|publisher=[[Fayerwayer]]|access-date=13 May 2017}}</ref>
* [[MegaFon]]<ref>{{cite web|title=Massive cyber attack creates chaos around the world|url=http://www.news.com.au/technology/online/hacking/massive-cyber-attack-creates-chaos-around-the-world/news-story/b248da44b753489a3f207dfee2ce78a9|publisher=news.com.au|access-date=13 May 2017}}</ref>
* [[Ministry of Internal Affairs (Russia)|Ministry of Internal Affairs of the Russian Federation]]<ref>{{cite web|title=Researcher 'accidentally' stops spread of unprecedented global cyberattack|url=http://abcnews.go.com/International/researcher-accidentally-stops-spread-unprecedented-global-cyberattack/story?id=47390745|publisher=[[ABC News]]|access-date=13 May 2017}}</ref>
* [[Ministry of Foreign Affairs (Romania)|Ministry of Foreign Affairs (Romania)]]<ref>{{cite web |url=http://www.libertatea.ro/stiri/atac-cibernetic-la-mae-1836024 |title=UPDATE. Atac cibernetic la MAE. Cine sunt hackerii de elită care au falsificat o adresă NATO |work=Libertatea |date=12 May 2017 |language=ro}}</ref>
* [[National Health Service (England)]]<ref name="uk">{{cite news|url=http://www.independent.co.uk/news/uk/home-news/nissan-sunderland-cyber-attack-ransomware-nhs-malware-wannacry-car-factory-a7733936.html|title=Cyber-attack that crippled NHS systems hits Nissan car factory in Sunderland and Renault in France|date=13 May 2017|website=The Independent|language=en|access-date=13 May 2017}}</ref><ref name="BBC news" /><ref name=guardian-nhs />
* [[NHS Scotland]]<ref name="BBC news" /><ref name=guardian-nhs />
* [[Nissan Motor Manufacturing UK]]<ref name="uk" />
* Pemerintah Negara Bagian India
** [[Government ofPemerintah Gujarat]]<ref name="auto2"/>
** [[Government ofPemerintah Kerala]]<ref name="auto2">{{cite news|title=Ransomware WannaCry Surfaces In Kerala, Bengal: 10 Facts|url=http://www.ndtv.com/india-news/ransomware-wannacry-surfaces-in-kerala-bengal-10-facts-1693806|accessdate=15 May 2017|work=New Delhi Television Limited (NDTV)}}</ref>
** [[Government ofPemerintah Maharashtra]]<ref>{{cite news|author1=Sanjana Nambiar|title=Hit by WannaCry ransomware, civic body in Mumbai suburb to take 3 more days to fix computers|url=http://www.hindustantimes.com/mumbai-news/hit-by-wannacry-ransomware-civic-body-in-mumbai-suburb-to-take-3-more-days-to-fix-computers/story-eSIMZQ2NFT217erJAFkS0J.html|accessdate=17 May 2017|work=[[Hindustn Times]]|date=16 May 2017|language=en}}</ref>
** [[GovernmentPemerintah ofBenggala West BengalBarat]]<ref name="auto2"/>
* [[PetroChina]]<ref name="cnn99countries" /><ref name="scmp" />
* [[Portugal Telecom]]<ref>{{cite web|url=http://observador.pt/2017/05/12/portugal-telecom-alvo-de-ataque-informatico-internacional/|title=PT Portugal alvo de ataque informático internacional|date=12 May 2017 | website=Observador | language=pt|access-date=13 May 2017}}</ref>
Baris 130 ⟶ 131:
* [[Saudi Telecom Company]]<ref>{{Cite tweet |user=AmjadShacker |author= Amjad Shacker |number= 863749329017868293 |date = 14 May 2017 |title=⁥⁥}}</ref>
* [[Sberbank]]<ref name=vidal/>
* [[Sun Yat-sen University]], ChinaTiongkok<ref name="misc"/>
* State Governments of India
** [[Government of Gujarat]]<ref name="auto2"/>
** [[Government of Kerala]]<ref name="auto2">{{cite news|title=Ransomware WannaCry Surfaces In Kerala, Bengal: 10 Facts|url=http://www.ndtv.com/india-news/ransomware-wannacry-surfaces-in-kerala-bengal-10-facts-1693806|accessdate=15 May 2017|work=New Delhi Television Limited (NDTV)}}</ref>
** [[Government of Maharashtra]]<ref>{{cite news|author1=Sanjana Nambiar|title=Hit by WannaCry ransomware, civic body in Mumbai suburb to take 3 more days to fix computers|url=http://www.hindustantimes.com/mumbai-news/hit-by-wannacry-ransomware-civic-body-in-mumbai-suburb-to-take-3-more-days-to-fix-computers/story-eSIMZQ2NFT217erJAFkS0J.html|accessdate=17 May 2017|work=[[Hindustn Times]]|date=16 May 2017|language=en}}</ref>
** [[Government of West Bengal]]<ref name="auto2"/>
* [[Sun Yat-sen University]], China<ref name="misc"/>
* [[Telefónica]]<ref name="spain">{{cite web|url=http://www.elperiodico.com/es/noticias/sociedad/ataque-informatico-masivo-infecta-las-grandes-empresas-espana-6033534|title=Un ataque informático masivo con 'ransomware' afecta a medio mundo|date=12 May 2017|publisher=elperiodico.com|language=es|access-date=13 May 2017}}</ref>
* [[Telenor Hungary]]<ref>{{cite news|last1=Balogh|first1=Csaba|title=Ideért a baj: Magyarországra is elért az óriási kibertámadás|url=http://hvg.hu/tudomany/20170512_wannacry_zsarolovirus_aldozatok_magyar_ceg|accessdate=13 May 2017|work=[[Heti Világgazdaság|HVG]]|date=12 May 2017|language=Hungarian}}</ref>
* [[Timrå Municipality]], SwedenSwedia<ref>{{cite news|url=https://www.svt.se/nyheter/inrikes/timra-kommun-drabbat-av-utpressningsattack|date=13 May 2017|publisher=[[Sveriges Television]]|title=Timrå kommun drabbat av utpressningsattack|language=sv|access-date=15 May 2017}}</ref>
* [[Universitas Jember]], Indonesia<ref>{{citeCite webnews|url=https://m.tempo.co/read/news/2017/05/16/058875604/virus-ransomware-wannacry-serang-perpustakaan-universitas-jember|title=Virus Ransomware WannacryWannaCry Serang Perpustakaan Universitas Jember|date=16 May 2017|websitework=[[Tempo.co]]|language=id|access-date=17 May 2017|editor-last=Baiduri|editor-first=MC Nieke Indrietta}}</ref>
* [[University of Milano-Bicocca]], ItalyItalia<ref>{{cite web|url=http://milano.repubblica.it/cronaca/2017/05/12/news/milano_virus_ransomware_universita_bicocca-165302056/|title=Il virus Wannacry arrivato a Milano: colpiti computer dell'università Bicocca|date=12 May 2017|website=la Repubblica|language=it|access-date=13 May 2017}}</ref>
* [[University of Montréal]], CanadaKanada<ref>{{cite news|title=Some University of Montreal computers hit with WannaCry virus|url=http://www.theglobeandmail.com/news/national/universite-de-montreal-computers-hit-with-wannacry-virus/article35004991/|accessdate=16 May 2017|work=The Globe and Mail|date=May 16, 2017}}</ref>
* [[Vivo (telekomunikasi)|Vivo]]<ref name="auto1" />}}
 
Baris 147 ⟶ 143:
{{Reflist|30em}}
 
[[Kategori:CS1Serangan maint:dunia Unrecognized languagemaya]]
[[Kategori:CS1 maint: Unrecognized language]]
[[Kategori:CS1 maint: Unrecognized language]]
[[Kategori:CS1 maint: Unrecognized language]]
[[Kategori:Peristiwa terkini]]