Chinese state media says US should take some blame for cyber attack

As the massive ransomware attack dubbed WannaCry, or WanaCrypt0r 2.0 continued to spread this week, IT departments worldwide scrambled to update and patch their systems to defend against this menace.

"This attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem", Microsoft President and Chief Legal Officer Brad Smith said in a blog post on Sunday, comparing the recent leaks of NSA and Central Intelligence Agency hacking tools to, in the real world, the theft of cruise missiles. The U.S. assesses the balance between cybersecurity and national interest through what is called the Vulnerabilities Equities Process, wherein a review board makes a final decision on whether a "vulnerability" needs to be reported or retained. "This is an emerging pattern in 2017".

Tom Bossert, a homeland security adviser to President Trump, said Monday on television that things are "right now, under control" in the United States.

Microsoft pointed that, "The governments of the world should treat this attack as a wake-up call".

Firstly, we would like to mention the Windows versions that are by far and large under the assault of WannaCry. But he disagreed about where the blame lies.

A group of hackers known as the Shadow Brokers said earlier this year that the NSA had tools for breaching the global system that allows for the transfer of money between banks.

According to Microsoft, computers running on Windows 10 were not targeted by the WannaCry ransomware. For the users on newer versions such as Windows 10, Windows 8.1, Windows 7, then you should have received a patch back in March.

However, this assertion by the government goes against claims from cyber security experts.

"Russia and India were hit particularly hard, largely because Microsoft's Windows XP, one of the operating systems most at risk, is still widely used in the countries", Ankush Johar, director at, a phishing protection company, told Economic Times.

"T$3 his attack demonstrates the degree to which cybersecurity has become a shared responsibility between tech companies and customers", Smith said in his blog post. Some of the victims have reportedly regained access to their files after paying, although security experts advise against complying with ransom demands.

  • Latoya Cobb