The News
Thursday 28 of March 2024

White House: Cyberattack Has Not Affected U.S. Government


Homeland security adviser Tom Bossert waits to speak to the media about the mass destruction offensive malware during the daily press briefing at the White House, Monday, May 15, 2017, in Washington,photo: AP/Andrew Harnik
Homeland security adviser Tom Bossert waits to speak to the media about the mass destruction offensive malware during the daily press briefing at the White House, Monday, May 15, 2017, in Washington,photo: AP/Andrew Harnik
The Department of Homeland Security (DHS) is taking the lead on the investigation in the United States

WASHINGTON – President Donald Trump’s homeland security adviser said Monday that the malware that has infected 300,000 computers in 150 countries is “in the wild,” but so far has not infiltrated U.S. government systems.

Tom Bossert, assistant to the president for homeland security and counterterrorism, said three variants of the malware have been discovered and the U.S. government was closely monitoring the situation with officials in Britain.

“Overall, the U.S. infection rate has been lower than many parts of the world, but we may still see significant impacts in additional networks as these malware attacks morph and change,” Bossert told reporters at the White House. “We had a small number of affected parties in the U.S., including FedEx. As of today, no federal systems are affected.”

Computers across the world were locked up Friday and users’ files held for ransom when dozens of countries were hit in a cyber-extortion attack that targeted hospitals, companies and government agencies. Cybersecurity experts say the unknown hackers who launched the “ransomware” attacks used a hole in Microsoft software that was discovered by the National Security Agency (NSA) and exposed when the agency’s documents were leaked online.

The Department of Homeland Security (DHS) is taking the lead on the investigation in the United States.

The Cyber Threat Intelligence Integration Center (CTIIC) is keeping the U.S. government informed about classified information concerning the investigation, he said.

If people in the U.S. follow the patching information issued by the FBI, Microsoft and the Homeland Security Department, they will be protected from the malware and the variants, Bossert said.

“While it would be satisfying to hold accountable those responsible for this hack — something that we are working on quite seriously — the worm is in the wild, so to speak at this point, and patching is the most important message as a result,” he said. “Despite appearing to be criminal activity intended to raise money, it appears that less than $70,000 has been paid in ransoms and we are not aware of payments that have led to any data recovery.”

DEB RIECHMANN