

However, if there's one out-of-date machine on a company's network, it could infect other connected computers.

Regular consumers who have up-to-date Windows computers are safe from this attack, experts say. "But the success levels are lower, as they're attacking the same vulnerabilities as WannaCry." "There obviously are companies that will have been affected by this in Asia," said Michael Gazeley, managing director of Hong Kong-based cybersecurity provider Network Box. And a Maersk facility for shipping containers in the Indian port city of Mumbai was shut down. Mondelez said its five manufacturing facilities in Australia and New Zealand had all been hit but some of them were still able to carry out limited production. It's not yet clear if companies in the Asia-Pacific region have been seriously affected. Related: Chernobyl monitoring system hit by global cyberattack The ransomware also caused problems with the monitoring system of the Chernobyl nuclear power plant. Banks, government offices, the postal service and Kiev's metro system were experiencing problems, officials said. Ukrainian organizations took a particularly heavy blow. French retailer Auchan Group and the real estate division of BNP Paribas were also affected. They include Russian oil and gas giant Rosneft, Danish shipping firm Maersk, U.S.-based pharmaceutical company Merck and law firm DLA Piper. Top international businesses headquartered in Europe and the U.S. Microsoft ( MSFT) released a patch for the flaw in March, but not all companies have used it.ĮternalBlue was in a batch of hacking tools leaked earlier this year that are believed to have belonged to the U.S. It uses a hacking tool called EternalBlue, which takes advantage of a weakness in Microsoft Windows. Researchers say the ransomware virus is a worm that infects networks by moving from computer to computer. Related: Why ransomware attacks keep happening Law enforcement and cybersecurity experts agree that victims should never pay ransoms for such attacks.

The email account associated with the ransomware has been blocked, so even if victims pay, they won't get their files back. It demands a $300 ransom in the anonymous digital currency Bitcoin. The ransomware infects computers and locks down their hard drives. Related: Another big malware attack ripples across the world Here's what you need to know about the attack:
