May 15, 2017


[On Monday morning, 11 technology companies in China, mostly dealing in internet security, suspended trading after their stocks rose 10 percent, the daily limit. Shares in European cybersecurity firms gained in early trading on Monday, as investors appeared to target companies that would benefit from increased attention on keeping data, networks and computers secure.]

By Gerry Mullany and Paul Mozur
An internet cafe in China. State news outlets said on Monday that about
40,000  institutions had been struck. Credit Associated Press
HONG KONG — A global cyberattack spread to thousands of additional computers on Monday as workers logged in at the start of a new workweek.

Universities, hospitals, businesses and daily life were disrupted, but no catastrophic breakdowns were reported. In Europe, where the cyberattack first emerged, officials said it appeared that a much-feared second wave — based on copycat variants of the original malicious software — had not yet materialized.

The new disruptions were most apparent in Asia, where many workers had already left on Friday when the attack broke out.

China alone reported disruptions at nearly 40,000 organizations, including about 4,000 academic institutions, figures that experts say are most likely to be low estimates, given the prevalence of pirated software there.

The list of affected institutions includes two of China’s most prestigious institutions of higher education, Tsinghua and Peking Universities; a movie theater chain in South Korea; and blue-chip companies in Japan like Hitachi and Nissan, which emphasized that their business operations had not been impaired.

The cyberattack has afflicted 200,000 computers in more than 150 countries. Transmitted by email, the malicious software, or malware, locks users out of their computers, threatening to destroy data if a ransom is not paid.

The so-called ransomware continued to ripple through politics and markets on Monday. Russia’s president, Vladimir V. Putin, blamed the United States, noting that the malicious software used in the attack had originally been developed by the National Security Agency. (It was then stolen and released by an elite hacking group known as the Shadow Brokers.)

On Monday morning, 11 technology companies in China, mostly dealing in internet security, suspended trading after their stocks rose 10 percent, the daily limit. Shares in European cybersecurity firms gained in early trading on Monday, as investors appeared to target companies that would benefit from increased attention on keeping data, networks and computers secure.

The disruptions in China cast a shadow over a major international conference that Beijing is hosting to promote its $1 trillion “One Belt, One Road” initiative, with participation from world leaders like Mr. Putin.

On Chinese social media, students reported being locked out of final papers, while other people said that A.T.M.s, some government offices and the payment systems at gas stations had been affected. Talk of how to avoid the virus was widespread on the messaging app WeChat over the weekend.

Securities and banking regulators issued warnings to businesses and financial institutions to audit their networks before bringing computers online to limit damage from the intrusion. The securities regulator also said that it had taken down its network and was installing a patch as a security measure.

The state-run oil company, PetroChina, confirmed that the attack had disrupted the electronic payment capabilities at many of its gas stations over the weekend. By Sunday, 80 percent of its stations were functioning normally again, it said.

The southern city of Yiyang, with a population of more than four million, said its traffic department had to disconnect from the internet and suspend all operations, while Xi’an, a city of more than eight million in central China, said the processing of drivers’ tests and traffic violations would be affected because its traffic department had similarly been cut off.

The spread of the malware has focused attention on why a software patch issued by Microsoft in March had not been installed by more users. Microsoft has complained for years that a large majority of computers running its software in China were using pirated versions.

The Australian prime minister, Malcolm Turnbull, said the attacks in his country seemed to be limited mostly to small businesses.

“We haven’t seen the impact that they’ve seen, for example, in the United Kingdom,” Mr. Turnbull said. “But it is very important that business and enterprises that are in the private or government sector make sure those patches for the Windows systems that were made available by Microsoft in March are installed.”

In Japan, about 2,000 terminals in 600 locations, used by individuals as well as by large companies, were most likely affected by the ransomware attack, according to JPCert, an independent group that helps respond to and track computer security breaches.

The South Korean government said that just nine cases of ransomware had been found in the country so far, and that dozens of samples of the malware were being analyzed.

In Europe, the malware did not appear to be spreading appreciably on Monday. “So far, the situation seems stable in Europe, which is a success,” said Jan Op Gen Oorth, a senior spokesman for Europol.

In Britain, where the attack was first detected on Friday, the National Health Service struggled to get hospitals, clinics and doctors’ offices fully operational. The attack had caused some patients to be turned away from emergency rooms, and surgical procedures and medical appointments needed to be rescheduled.

“We have not seen a second wave of attacks, and the level of criminal activity is at the lower end of the range that we had anticipated, and so I think that is encouraging,” the British health minister, Jeremy Hunt, told Sky News on Monday. But he also warned against complacency: “The message is very clear, not just for organizations like the N.H.S. but for private individuals, for businesses.”

The health service has been criticized for using outdated software despite repeated warnings. Mr. Hunt said they were “making sure that our data is properly backed up, and making sure that we are using the software patches.”

The British National Crime Agency, which is taking part in a global investigation into the attack, said that a second wave of attacks could still occur, and it urged computers users to take precautions.

A Renault factory in Douai, France, that employs around 5,500 people did not open on Monday because information security technicians were performing “preventive testing” on the information and robotics system before restarting production on Tuesday. The company said that no data had been lost or damaged, and that no ransom had been paid.

In Germany, the national railway operator, Deutsche Bahn, said that the attack had infected electronic information boards showing arrivals and departures, and video surveillance cameras at some stations. Several of Deutsche Bahn’s 7,000 electronic ticket machines were also affected, but nearly all had been repaired by Sunday, the company said. Rail travel was not affected.

Deutsche Bahn appeared to be the only major company in Germany affected by the hacking attack. Nevertheless, the country’s Federal Criminal Police Office opened an investigation. Last year, the country passed security legislation aimed at helping to prevent such malware attacks, after criminals believed to be Russian hackers managed to breach the German Parliament’s network in 2015.

An earlier version of this article misstated the direction of Chinese internet security stocks in the wake of the ransomware attack. Trading was suspended in these stocks after they rose, not fell.

Reporting was contributed by Liz Alderman from Paris; Sewell Chan from London; Choe Sang-Hun from Seoul, South Korea; Melissa Eddy from Berlin; Sophia Kishkovsky from Moscow; Sui-Lee Wee from Beijing; and Jacqueline Williams from Sydney, Australia. Owen Guo and Xu Qi contributed research from Beijing.