The ransomware encrypts victims' files in a computer until they pay for decrypting them.
Experts were scrambling to determine who was behind the attack, which exploited a security flaw in older versions of Microsoft's Windows operating software.
National Informatics Centre, which manages government websites, and the Centre for Development of Advanced Computing installed security patches issued by Microsoft to immunize their Windows systems.
He said a cyber coordination center will start operating from next month to take precautions against such attacks.
Microsoft, Apple Inc., and others have pushed back against efforts by those agencies to seek technical backdoors in their products to monitor targets, because the tech companies fear the perception of complicity with the US government could alienate customers in the USA and overseas. "An equivalent scenario with conventional weapons would be the US military having some of its Tomahawk missiles stolen". Smith says that's wrong.
GSTN, the company set up to provide the IT infrastructure for GST rollout, will not be impacted by the WannaCry ransomware attack as its systems do not run on Microsoft software, its CEO Prakash Kumar said.
He argued there should be "a new requirement for governments to report vulnerabilities to vendors, rather than stockpile, sell, or exploit them".
He warned of the danger of exploits developed by governments - this time the NSA in America - falling into the hands of hackers and causing widespread damage as is the case with the current attack which has crippled more than 200,000 computers around the world.
Microsoft is now confirming that the WannaCrypt exploits used in the attack on Friday were drawn from the trove of exploits stolen from the NSA.
He said tech companies, customers and the government need to "work together" to protect against attacks. "While this protected newer Windows systems and computers that had enabled Windows Update to apply this latest update, many computers remained unpatched globally", Smith wrote. "Otherwise they're literally fighting the problems of the present with tools from the past".
After infecting over two lakh computers in several countries, the global virus attack continued for the third day on Monday, with more reports of hacking pouring in from India, China and Japan as offices re-opened after a tumultuous weekend.