{"id":17958,"date":"2017-05-15T09:22:12","date_gmt":"2017-05-15T16:22:12","guid":{"rendered":"http:\/\/www.yardi.com\/blog\/?p=17958"},"modified":"2020-12-24T22:16:07","modified_gmt":"2020-12-25T06:16:07","slug":"ransomware-rundown","status":"publish","type":"post","link":"https:\/\/www.yardi.com\/blog\/ransomware-rundown\/","title":{"rendered":"Ransomware Rundown"},"content":{"rendered":"<p>Though some experts predicted the final payoff would hit one billion dolla<img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-17976\" src=\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/05\/hack.png\" alt=\"hack\" width=\"477\" height=\"368\" \/>rs, Friday&#8217;s ransomware attack &#8211; believed to be one of the largest ever perpetrated &#8211; ended with a fizzle\u00a0over the weekend with the hackers barely pulling in <a href=\"https:\/\/krebsonsecurity.com\/2017\/05\/global-wana-ransomware-outbreak-earned-perpetrators-26000-so-far\/\" target=\"_blank\" rel=\"noopener\">$26,000<\/a>\u00a0before being\u00a0 temporarily stopped in their tracks by an anonymous cyber security expert.<\/p>\n<p>Summarizing the situation Monday morning, Jan Op Gen Oorth, senior spokesman for Europol, <a href=\"http:\/\/www.bbc.com\/news\/technology-39920141\" target=\"_blank\" rel=\"noopener\">told the AFP<\/a>, &#8220;The number of victims appears not to have gone up and so far the situation seems stable in Europe, which is a success.&#8221;<\/p>\n<p>&#8220;It seems that a lot of internet security guys over the weekend did their homework and ran the security software updates.&#8221;<\/p>\n<p><strong>A Simple Fix<\/strong><\/p>\n<p>According to\u00a0<a href=\"http:\/\/gizmodo.com\/global-ransomware-attack-accidentally-halted-but-its-pr-1795191097\" target=\"_blank\" rel=\"noopener\">Gizmodo<\/a>\u00a0the damage was mitigated, in part, due to the\u00a0quick action of\u00a0an &#8220;anonymous 26-year-old security researcher&#8221; named MalwareTech, who managed to temporarily slow the spread of the ransomware attack late Friday. After\u00a0discovering the domain name associated with the ransomware, iuqerfsodp9ifjaposdfjhgosurijfaewrwergwe- a.com was available for purchase for just $10.69, MalwareTech bought the domain and halted the attack.<\/p>\n<p>\u201cInitially someone had reported the wrong way round that we had caused the infection by registering the domain, so I had a mini freak out until I realized it was actually the other way around and we had stopped it,\u201d MalwareTech told<span class=\"Apple-converted-space\">\u00a0<\/span><a href=\"https:\/\/www.theguardian.com\/technology\/2017\/may\/13\/accidental-hero-finds-kill-switch-to-stop-spread-of-ransomware-cyber-attack\" target=\"_blank\" rel=\"noopener\"><em>The Guardian<\/em><\/a>.<\/p>\n<p>According to Matthieu Suiche, founder of cybersecurity firm<span class=\"Apple-converted-space\">\u00a0<\/span><a href=\"https:\/\/www.comae.io\/\" target=\"_blank\" rel=\"noopener\">Comae Technologies<\/a>, MaltechWare&#8217;s registration of the domain stopped the malware from spreading\u00a0throughout the US.<\/p>\n<p>\u201cThe kill switch is why the U.S. hasn\u2019t been touched so far,\u201d he told the<span class=\"Apple-converted-space\">\u00a0<\/span><a href=\"https:\/\/www.nytimes.com\/2017\/05\/13\/world\/asia\/cyberattacks-online-security-.html?hp&amp;action=click&amp;pgtype=Homepage&amp;clickSource=story-heading&amp;module=first-column-region&amp;region=top-news&amp;WT.nav=top-news\" target=\"_blank\" rel=\"noopener\"><em>New York Times<\/em><\/a> on Saturday. \u201cBut it\u2019s only temporary. All the attackers would have to do is create a variant of the hack with a different domain name. I would expect them to do that.\u201d<\/p>\n<p><strong>A Global Attack<\/strong><\/p>\n<p>The flurry of ransomware attacks shut down several UK hospitals and spread to multinational companies and governments in 150 countries.\u00a0While England\u2019s National Healthcare System (NHS) received most of the initial attention, Russia, Taiwan and Spain appeared to have been hit the hardest while the U.S. remained relatively unscathed.<\/p>\n<p>According to the New York Times, the tool used to unleash the ransomware was leaked by the group Shadow Brokers as part of the group\u2019s online release of NSA hacking tools online last month.<\/p>\n<p>Operating under a variation on the name \u201cWannaCry,\u201d the malware exploits a Windows vulnerability known as EternalBlue allegedly discovered by the <a href=\"https:\/\/www.wired.com\/2017\/04\/major-leak-suggests-nsa-deep-middle-east-banking-system\/\" target=\"_blank\" rel=\"noopener\">NSA<\/a>. \u00a0The attacks were most successful on computers running unpatched versions of Microsoft Windows up through version 10. Though Microsoft sent a patch (<a href=\"https:\/\/go.redirectingat.com\/?id=100099X1555751&amp;site=wired.com&amp;xs=1&amp;isjs=1&amp;url=https%3A%2F%2Ftechnet.microsoft.com%2Fen-us%2Flibrary%2Fsecurity%2Fms17-010.aspx&amp;xguid=a7c40cf0efcd6e78bd0e2718e965a14b&amp;xuuid=696321c4829e7a652cd8db16834b2f0c&amp;xsessid=&amp;xcreo=0&amp;xed=0&amp;sref=https%3A%2F%2Fwww.wired.com%2F2017%2F05%2Fransomware-meltdown-experts-warned%2F&amp;pref=https%3A%2F%2Fwww.wired.com%2F&amp;xtz=420&amp;abp=1\" target=\"_blank\" rel=\"noopener\">MS17-010<\/a>) for the particular vulnerability exploited by the malware back in March, the hackers won on the gable that most users had failed to update their systems, highlighting the need for organizations to stay on top of all the latest security protocols.<\/p>\n<p>\u201cThis highlights the importance of regular patching of Windows OS (operating system) of servers and workstations,\u201d noted Jay Shobe, Vice President, Technology at Yardi. \u201cMicrosoft released a patch in March to fix particular this vulnerability, so servers that are up to date with patches are not affected. In addition, keeping on current Windows versions is essential as well.\u00a0 For example, Microsoft stopped patching Windows XP in 2014, so there is no protection for workstations running on that version of Windows.<\/p>\n<p>\u201cCyber security constantly evolves,\u201d he added. \u201cIt\u2019s important to maintain constant network security that\u2019s able to adapt as the threat changes.\u201d<\/p>\n<p><strong>Old OS at Fault<\/strong><\/p>\n<p>Unfortunately, the NHS was particularly susceptible to this type of incursion because the organization relies on Windows XP. <a href=\"http:\/\/www.silicon.co.uk\/security\/nhs-hospitals-data-risk-outdated-windows-xp-201761\">As reported<\/a> in December, the UK government\u2019s security agreement with Microsoft, which cost the country \u00a35.5 million per year, came to an end on May 15, 2016. The government chose to discontinue Microsoft security support, relying instead on government organizations and departments to make the switch to Windows 10, but that massive migration never took place.<\/p>\n<p>In fact, at the beginning of the year, Freedom of Information request filed by Motherboard <a href=\"https:\/\/motherboard.vice.com\/read\/nhs-hospitals-are-running-thousands-of-computers-on-unsupported-windows-xp?utm_source=mbtwitter\" target=\"_blank\" rel=\"noopener\">revealed<\/a> thousands of NHS computers were still running on the outdated OS. Those systems included tens of thousands of machines either left unpatched or running an older version of Windows.<\/p>\n<p>As Sam Pudwell noted in an article for <a href=\"http:\/\/www.silicon.co.uk\/security\/nhs-hospitals-data-risk-outdated-windows-xp-201761\">Silicon UK<\/a>, \u201cBy running Windows XP, NHS Hospitals risk breaching data protection regulations, which are set to become even more stringent through the new\u00a0General Data Protection Regulation (GDPR) coming into force in 2018. Legal experts have confirmed that the guilty hospitals may be in breach of current regulations.\u201d<\/p>\n<p>Jon Baines, Chair of the\u00a0<a href=\"https:\/\/www.nadpo.co.uk\/\" target=\"_blank\" rel=\"noopener\">National Association of Data Protection and Freedom of Information Officers<\/a>\u00a0(NADPO) told Pudwell, \u201cIf hospitals are knowingly using insecure XP machines and devices to hold and otherwise process patient data they may well be in serious contravention of their obligations.\u201d<\/p>\n<p><em>Hospitals on High Alert<\/em><\/p>\n<p>As reported by the <a href=\"https:\/\/www.nytimes.com\/2017\/05\/12\/world\/europe\/uk-national-health-service-cyberattack.html?_r=0\" target=\"_blank\" rel=\"noopener\">New York Times<\/a> and other media outlets, the ransomware attack appeared to be a variant of the familiar <a href=\"http:\/\/www.wired.co.uk\/article\/wanna-decryptor-ransomware\" target=\"_blank\" rel=\"noopener\">Wanna decryptor<\/a> malware. Users attempting to log into the network were greeted with a <a href=\"http:\/\/www.jems.com\/articles\/news\/2017\/05\/uk-hospital-cyber-attack.html\" target=\"_blank\" rel=\"noopener\">pop-up message<\/a> saying \u201cOoops, your files have been encrypted!\u201d with a demand of $300 worth of online currency Bitcoin to release the system.<\/p>\n<p>A message from the ransomware attackers demanded a bitcoin payment in order to release the system. In all, 61 NHS operations throughout Britain were affected, causing ambulances to be diverted\u00a0as well as\u00a0cancellation of scheduled operations and nonemergency procedures. According to a report from the Health Service Journal, X-ray machines, patient administration systems and pathology tests had all been affected. Phone lines and email were also inaccessible. Blood work and other diagnostics services had to be put on hold.<\/p>\n<p>\u201cJust about to start a night shift,\u201d said Reddit user <a href=\"https:\/\/www.reddit.com\/user\/Tildah\" target=\"_blank\" rel=\"noopener\">Tildah<\/a>, \u201cNo computers, no electronic prescribing. X-rays are being printed and have to be viewed in [the] radiology department.\u201d<\/p>\n<p>While NHS state the attack did not seem to be \u201cspecifically targeted at NHS,\u201d officials were working with the government&#8217;s National Cyber Security Centre to craft a solution. In the meantime, several hospitals in the country posted notifications online alerting patients and their families of possible delays due to \u201ca major IT disruption.\u201d<\/p>\n<p>\u201cOur focus is on supporting organisations to manage the incident swiftly and decisively,\u201d the NHS statement continued, \u201cbut we will continue to communicate with NHS colleagues and will share more information as it becomes available.\u201d<\/p>\n<p>According to <a href=\"https:\/\/www.wired.co.uk\/article\/nhs-cyberattack-ransomware-security\">Wired<\/a>, hospitals and private practitioners were both hit by the cyber attack, resulting in an advisory asking citizens to avoid seeking medical attention unless facing a life-threatening emergency. The attack began in the north and southwest regions of the country but was said to be \u201ccreeping\u201d across the nation, with the southern part of England reporting another attack Friday afternoon targeting general practitioners.<\/p>\n<p>\u201cI&#8217;m a doctor in one of the affected hospitals, a major trauma center in London,\u201d wrote user <a href=\"https:\/\/www.reddit.com\/user\/purplepatch\" target=\"_blank\" rel=\"noopener\">purplepatch<\/a> on <a href=\"https:\/\/www.reddit.com\/r\/worldnews\/comments\/6arkxt\/hospitals_across_england_hit_by_largescale\/\" target=\"_blank\" rel=\"noopener\">Reddit<\/a> late Friday afternoon. \u201cEverything has gone down. No blood results, no radiology images, there&#8217;s no group specific blood available. They&#8217;ve declared a major internal incident, the hospital is diverting major trauma and stroke patients. All elective surgery was canceled from about 1 pm. We&#8217;re not doing anything in the theatre that&#8217;s not life or limb threatening. There will almost certainly be deaths as a result of this.\u201d<\/p>\n<p><strong>Cutting the Cord<\/strong><\/p>\n<p>As reports of the ransomware attack spread, some organizations acted quickly to disconnect their networks. In a message to a Guardian reporter, one NHS IT worker from an Essex hospital explained the disconnect notice came through around 2 pm Friday afternoon.<\/p>\n<p>\u201cWe were told to shut down, take out network cables and unplug the phones,\u201d she said. \u201cA message came up for just one of our team about the fact that all the files would be wiped in two hours unless we gave $300 in bitcoins.\u201d<\/p>\n<p>She confirmed the demand for $300 in Bitcoin, noting that ransom message warned, \u201cMany of your documents, photos, videos, databases and other files are no longer accessible because they have been encrypted. Maybe you are busy looking for a way to recover your files but do not waste your time. Nobody can recover your files without our decryption service.\u201d<\/p>\n<p>\u201cYou only have three days to submit the payment,\u201d the ransom note cautioned. \u201cAfter that, the price will be doubled. Also if you don\u2019t pay in seven days, you won\u2019t be able to recover your files forever.\u201d<\/p>\n<p>Derbyshire Community Health Services, which operates as part of the NHS Foundation Trust, reassured patients in a <a href=\"http:\/\/www.dchs.nhs.uk\/home\/news\/you-may-have-heard-in-the-news\/\" target=\"_blank\" rel=\"noopener\">statement<\/a> that they had not been hit by a cyber-attack, but had \u201cswitched off the IT systems that pose the biggest risk.\u201d<\/p>\n<p>Returning to paper records and handwritten notes, Derbyshire explained they\u2019d \u201cgone &#8216;back to basics&#8217; for some tasks &#8211; so you might find things take a little longer than they would normally.\u201d<\/p>\n<p><strong>Health and Safety at Risk<\/strong><\/p>\n<p>Sky News posted a <a href=\"http:\/\/news.sky.com\/video\/digi-182212fr-dr-george-farrelly-nhs-cyber-attacksm2t-10874554\" target=\"_blank\" rel=\"noopener\">video interview<\/a> with Dr. George Farrelly deploring, \u201camoral people interfering with vulnerable people.\u201d Dr. Farrelly explained to Sky News that his office took the precaution of printing the day\u2019s appointments after receiving a warning a neighboring practice had been hit. At 1 pm, the office&#8217;s computers were locked, and the familiar ransomware notice appeared.<\/p>\n<p>When asked if his office was prepared for an attack of this nature, Dr. Farrelly replied, \u201cWe were told we were operating within a very secure system with the NHS.\u201d<\/p>\n<p>Highlighting just how unprepared many healthcare providers are when it comes to network security, Farrelly added, \u201cWe are aware of cyber security, but our practice doesn\u2019t have any kind of contingency plan when we have a shutdown of our system.\u201d<\/p>\n<p>\u201cYou have to understand that those of us who have gone paperless \u2013 which includes an increasing number of practices \u2013 rely wholly on our web-based system to operate. All our information is based on the computer.\u201d<\/p>\n<p>Officials stated that though operations had been disrupted, no patient records appeared compromised. According to <a href=\"https:\/\/www.theguardian.com\/society\/2017\/may\/12\/hospitals-across-england-hit-by-large-scale-cyber-attack\" target=\"_blank\" rel=\"noopener\">the Guardian<\/a>, law enforcement personnel indicated\u00a0the attack seemed to be criminal rather than an action perpetrated by a foreign power, making the threat serious but so far, not an incident with \u201cnational security implications.\u201d<\/p>\n<p>\u201cAt this stage, we do not have any evidence that patient data has been accessed,\u201d NHS Digital declared in a <a href=\"https:\/\/digital.nhs.uk\/article\/1491\/Statement-on-reported-NHS-cyber-attack\" target=\"_blank\" rel=\"noopener\">statement<\/a>. \u201cWe will continue to work with affected organisations to confirm this.\u201d<\/p>\n<p><strong>Global Concern<\/strong><\/p>\n<p>As England struggled to regain control of their healthcare network, the Spanish government announced that several large companies, including telecom giant Telefonica, had also been compromised. Spain\u2019s natural gas company Gas Natural and electric company Iberdrola were\u00a0also victims. According to Wired, the incidents appeared \u201cto be part of a global cyber security incident with malware spreading to multiple organisations around the world.\u201d In fact, but the end of the day on Friday several more countries reported attacks and compromised systems.<\/p>\n<p>\u201cSecurity firm Check Point said it has seen instances in multiple countries\u201d reported Wired. \u201cTelefonica in Spain has been the biggest confirmed incident outside of the UK, but it also reports issues in Russia, Turkey, Indonesia, Vietnam, Japan, and Germany.\u201d<\/p>\n<p>\u201cA\u00a0<a href=\"https:\/\/intel.malwaretech.com\/botnet\/wcrypt\" target=\"_blank\" rel=\"noopener\">live map<\/a>\u00a0tracking the malware has plotted thousands of incidents around the world. Although, it is not confirmed these are all the latest version of the malware.\u201d<\/p>\n<p>As night fell over London, malware infections had been reported in 99 countries, though that number would rise to 150 over the weekend.\u00a0 Updates and public comment on the NHS attack continued on Twitter under the <a href=\"https:\/\/twitter.com\/hashtag\/nhscyberattack?src=hash\" target=\"_blank\" rel=\"noopener\">#nhscyberattack<\/a> header.<\/p>\n<p>Echoing sentiments expressed by many in the Twittersphere, Kanayo Onyeka wrote, \u201cOrganisations need to take cyber security seriously. This isn&#8217;t funny. The vulnerability has been there for a while\u2026\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A flurry of ransomware attacks on Friday caused widespread disruptions throughout the globe, including the UK&#8217;s NHS system.<\/p>\n","protected":false},"author":103,"featured_media":17976,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_s2mail":"yes","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6],"tags":[1928,1693,99,1914,359,1495],"class_list":["post-17958","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","tag-cyber-security","tag-data-breach","tag-data-security","tag-it-security","tag-online-security","tag-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Yardi Blog<\/title>\n<meta name=\"description\" content=\"A flurry of ransomware attacks on Friday caused widespread disruptions throughout the globe, including the UK&#039;s NHS system.\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Rundown\" \/>\n<meta property=\"og:description\" content=\"A flurry of ransomware attacks on Friday caused widespread disruptions throughout the globe, including the UK&#039;s NHS system.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.yardi.com\/blog\/ransomware-rundown\/\" \/>\n<meta property=\"og:site_name\" content=\"Yardi Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-15T16:22:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-25T06:16:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/05\/hack.png\" \/>\n\t<meta property=\"og:image:width\" content=\"638\" \/>\n\t<meta property=\"og:image:height\" content=\"492\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Cutright Elizabeth\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cutright Elizabeth\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.yardi.com\/blog\/ransomware-rundown\/\",\"url\":\"https:\/\/www.yardi.com\/blog\/ransomware-rundown\/\",\"name\":\"Ransomware Rundown - Yardi Corporate Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/ransomware-rundown\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/ransomware-rundown\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/05\/hack.png\",\"datePublished\":\"2017-05-15T16:22:12+00:00\",\"dateModified\":\"2020-12-25T06:16:07+00:00\",\"author\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/dba832121806bbec3d280d6cdde90b4d\"},\"description\":\"A flurry of ransomware attacks on Friday caused widespread disruptions throughout the globe, including the UK's NHS system.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/ransomware-rundown\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.yardi.com\/blog\/ransomware-rundown\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.yardi.com\/blog\/ransomware-rundown\/#primaryimage\",\"url\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/05\/hack.png\",\"contentUrl\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/05\/hack.png\",\"width\":638,\"height\":492},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.yardi.com\/blog\/ransomware-rundown\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.yardi.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware Rundown\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.yardi.com\/blog\/#website\",\"url\":\"https:\/\/www.yardi.com\/blog\/\",\"name\":\"Yardi Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.yardi.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/dba832121806bbec3d280d6cdde90b4d\",\"name\":\"Cutright Elizabeth\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4016b5eabd512619820fc63946d01cd983acc211f98fbc559a890a5b4b27c559?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4016b5eabd512619820fc63946d01cd983acc211f98fbc559a890a5b4b27c559?s=96&d=mm&r=g\",\"caption\":\"Cutright Elizabeth\"},\"description\":\"Elizabeth Cutright is an award-winning writer and editor with over 20 years of experience in journalism, publishing and online content creation. A film school grad with a law degree from the University of San Diego, outside of work Elizabeth can usually be found in the pool, on a hiking trail, or sampling Santa Barbara\u2019s latest vintage.\",\"url\":\"https:\/\/www.yardi.com\/blog\/author\/elizabeth-cutright-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Yardi Blog","description":"A flurry of ransomware attacks on Friday caused widespread disruptions throughout the globe, including the UK's NHS system.","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"Ransomware Rundown","og_description":"A flurry of ransomware attacks on Friday caused widespread disruptions throughout the globe, including the UK's NHS system.","og_url":"https:\/\/www.yardi.com\/blog\/ransomware-rundown\/","og_site_name":"Yardi Blog","article_published_time":"2017-05-15T16:22:12+00:00","article_modified_time":"2020-12-25T06:16:07+00:00","og_image":[{"width":638,"height":492,"url":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/05\/hack.png","type":"image\/png"}],"author":"Cutright Elizabeth","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cutright Elizabeth","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.yardi.com\/blog\/ransomware-rundown\/","url":"https:\/\/www.yardi.com\/blog\/ransomware-rundown\/","name":"Ransomware Rundown - Yardi Corporate Blog","isPartOf":{"@id":"https:\/\/www.yardi.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.yardi.com\/blog\/ransomware-rundown\/#primaryimage"},"image":{"@id":"https:\/\/www.yardi.com\/blog\/ransomware-rundown\/#primaryimage"},"thumbnailUrl":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/05\/hack.png","datePublished":"2017-05-15T16:22:12+00:00","dateModified":"2020-12-25T06:16:07+00:00","author":{"@id":"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/dba832121806bbec3d280d6cdde90b4d"},"description":"A flurry of ransomware attacks on Friday caused widespread disruptions throughout the globe, including the UK's NHS system.","breadcrumb":{"@id":"https:\/\/www.yardi.com\/blog\/ransomware-rundown\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.yardi.com\/blog\/ransomware-rundown\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.yardi.com\/blog\/ransomware-rundown\/#primaryimage","url":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/05\/hack.png","contentUrl":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/05\/hack.png","width":638,"height":492},{"@type":"BreadcrumbList","@id":"https:\/\/www.yardi.com\/blog\/ransomware-rundown\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.yardi.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Ransomware Rundown"}]},{"@type":"WebSite","@id":"https:\/\/www.yardi.com\/blog\/#website","url":"https:\/\/www.yardi.com\/blog\/","name":"Yardi Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.yardi.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/dba832121806bbec3d280d6cdde90b4d","name":"Cutright Elizabeth","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4016b5eabd512619820fc63946d01cd983acc211f98fbc559a890a5b4b27c559?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4016b5eabd512619820fc63946d01cd983acc211f98fbc559a890a5b4b27c559?s=96&d=mm&r=g","caption":"Cutright Elizabeth"},"description":"Elizabeth Cutright is an award-winning writer and editor with over 20 years of experience in journalism, publishing and online content creation. A film school grad with a law degree from the University of San Diego, outside of work Elizabeth can usually be found in the pool, on a hiking trail, or sampling Santa Barbara\u2019s latest vintage.","url":"https:\/\/www.yardi.com\/blog\/author\/elizabeth-cutright-2\/"}]}},"jetpack_featured_media_url":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/05\/hack.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts\/17958","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/users\/103"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/comments?post=17958"}],"version-history":[{"count":10,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts\/17958\/revisions"}],"predecessor-version":[{"id":27715,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts\/17958\/revisions\/27715"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/media\/17976"}],"wp:attachment":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/media?parent=17958"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/categories?post=17958"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/tags?post=17958"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}