two bitcoins—currently worth about $ 25,000—to hackers who are holding the county ’ s computer files for ransomAttack.Ransom, [ Update : they refused to payAttack.Ransom] . The situation is the latest example of cyber criminals deployingAttack.Ransoma form of software known as ransomware , which freezes up files on a computer network until someone enters a decryption code to unlock them . Typically , the code can only be obtained by payingAttack.Ransomthe hackers . An official for the county , which encompasses the city of Charlotte , said the ransomware was triggered when an employee clicked on an email attachment , and that it is wrecking havoc with daily operations : “ She said an example of the problem is the county ’ s code enforcement office , where much of the work is done electronically . Employees no longer have access to their records . But she said they are switching to paper records for work on Wednesday , ” according to the Charlotte Observer . The official also explained that the county faces a dilemma in deciding whether to payAttack.Ransom. While paying the ransomAttack.Ransommay be the only way to obtain the decryption key , there is no guarantee the hackers will honor their commitment and provide the key . The anonymous hackers do not appear to have targeted Mecklenburg county in particular , but rather the official thinks the attack was launched as part of a broader money-making scheme involving ransomware . Similar attacks , which typically exploit old Microsoft software , struck millions of computers in two separate waves earlier this year , affecting everything from businesses to governments to hospitals . While most of the incidents occurred in Europe and Asia , U.S. organizations were hit too—including a transit system in Sacramento , Calif. and a hospital in Los Angeles .
A flaw in unpatched versions of Window 10 could leave machines vulnerableVulnerability-related.DiscoverVulnerabilityto EternalBlue , the remote kernel exploit behind the recent WannaCry ransomware attackAttack.Ransom. WannaCry targeted a Server Message Block ( SMB ) critical vulnerability that Microsoft patchedVulnerability-related.PatchVulnerabilitywith MS17-010 on March 14 , 2017 . While WannaCry damageAttack.Ransomwas mostly limited to machines running Windows 7 , a different version of EternalBlue could infect Windows 10 . Researchers at RiskSense stripped the original leaked version of EternalBlue down to its essential components and deemed parts of the data unnecessary for exploitation . They found they could bypass detection rules recommended by governments and antivirus vendors , says RiskSense senior security researcher Sean Dillon . This version of EternalBlue , an exploit initially released by Shadow Brokers earlier this year , does not use the DoublePulsar payload common among other exploits leaked by the hacker group . DoublePulsar was the main implant used in WannaCryAttack.Ransomand a key focus for defenders . `` That backdoor is unnecessary , '' says Dillon , noting how it 's dangerous for businesses to only focus on DoublePulsar malware . `` This exploit could directly load malware onto the system without needing to install the backdoor . '' EternalBlue gives instant un-credentialed remote access to Windows machines without the MS17-010 patch update . While it 's difficult to port EternalBlue to additional versions of Windows , it 's not impossible . Unpatched Windows 10 machines are at risk , despite the fact that Microsoft 's newest OS receives exploit mitigations that earlier versions do n't . The slimmed-down EternalBlue can be ported to unpatched versions of Windows 10 and deliver stealthier payloads . An advanced malware would be able to target any Windows machine , broadening the spread of an attack like WannaCry , Dillon explains . It 's worth noting WannaCry was a blatant , obvious attack , he says , and other types of malware , like banking spyware and bitcoin miners , could more easily fly under the radar . `` These can infect a network and you wo n't know about it until years later , '' he says . `` It 's a threat to organizations that have been targets , like governments and corporations . Attackers may try to get onto these networks and lay dormant … then stealAttack.Databreachintellectual property or cause other damage . '' Dillon emphasizes the importance of updatingVulnerability-related.PatchVulnerabilityto the latest version of Windows 10 , but says patchingVulnerability-related.PatchVulnerabilityalone wo n't give complete protection from this kind of threat . Businesses with SMB facing the Internet should also put up firewalls , and set up VPN access for users who need external access to the internal network . Businesses should have a good inventory of software and devices on their networks , along with processes for identifying and deployingVulnerability-related.PatchVulnerabilitypatches as they are releasedVulnerability-related.PatchVulnerability, says Craig Young , computer security researcher for Tripwire 's Vulnerability and Exposures Research Team ( VERT ) . This will become even more critical as attackers move quickly from patch to exploit . There will always be a window of opportunity for attackers before the right patches are installedVulnerability-related.PatchVulnerability, Young notes . EternalBlue is a `` very fresh vulnerability '' given that most breaches that use exploits leverage flaws that have been publicly knownVulnerability-related.DiscoverVulnerabilityfor an average of two years or more . `` EternalBlue is a particularly reliable exploit that gives access to execute code at the very highest privilege level , so I would expect that hackers and penetration testers will get a lot of use out of it for years to come , '' he says .