By SYLVIA HUI, SARA BURNETT and ALLEN G.
"The governments of the world should treat this attack as a wake-up call".
Copycat variants of the malicious software behind the attacks have begun to proliferate, according to experts, who were on guard for new attacks.
Some intelligence agency experts also questioned Microsoft's NSA argument, saying it's unreasonable for the company to ask governments to stop using its products as a way to attack and monitor enemies.
Like many closed systems, medical systems were originally designed with no security in mind. Huss took a screen shot of his discovery and shared it on Twitter. Many of those victims will be businesses, including large corporations. It's not uncommon for them to use aliases, either to protect themselves from retaliatory attacks or for privacy.
"Malware created by intelligence agencies can backfire on its creators", he told reporters in Beijing, adding that Russian Federation had "nothing to do" with the attack. It is not known who is behind the Shadow Brokers.
The US government should have treated the stealing of the NSA tool - WannaCry that was apparently modified for Friday's cyber-attack by anonymous hackers - and applied the same rules and remedial measures to it as it would do in case someone stole the Tomahawk missiles from its military. "Otherwise they're literally fighting the problems of the present with tools from the past", he said.
A malware tracking map showed "WannaCry" infections were widespread. Train systems were hit in Germany and Russian Federation, and phone companies in Madrid and Moscow.
It was also revealed that Mr Hunt was warned past year about the vulnerability of NHS computer systems to attack. But U.K. hospitals, Chinese universities and global firms like Fedex also reported they had come under assault. Microsoft was quick to change its policy, announcing free security patches to fix this vulnerability in the older Windows systems still used by millions of individuals and smaller businesses.
The national railway system said that although it was attacked, rail network operations were unaffected.
In a statement, the Home Secretary, Amber Rudd, denied that under-investment in cybersecurity had caused the problem. While the United Kingdom government did make steps to improve IT security by issuing the NHS Information Governance toolkit, it mostly consisted of a bundle of high-level legal requirements and lacked clear technical direction or audit management.
Cyber security experts had voiced concerns that as hospitals switched on many pieces of equipment on Monday morning, the equipment could become infected and spread malware. As the Friday, May 12, 2017, global cyberextortion attack that held people's computer files hostage slows, authorities are working to catch the crooks behind it, which is a hard task that involves searching for digital clues and following the money.
The WannaCry program encrypts your files and demands payment in bitcoin in order to regain access.
This is already believed to be the biggest online extortion attack ever recorded, disrupting services in nations as diverse as the U.S., Ukraine, Brazil, Spain and India.
"The numbers are still going up", Wainwright said.
"I doubt there can be any liability that stems back to the NSA", Dore said.
However, Wainwright said so far "remarkably few" payments had been made by the victims of the attack.
The MalwareTech researcher agreed that the threat hasn't disappeared.
"Just patch their systems as soon as possible", MalwareTech said. An unidentified young cybersecurity researcher claimed to help halt WannaCry's spread by activating a so-called "kill switch".
"Technology companies owe their customers a reliable process for patching security vulnerabilities, " he said.
This is because the virus may be spreading via email attachments or trusted websites, Mr MacGibbon told ABC, and if you don't open or click on to the infected sites then you won't be impacted.
The security holes it exploits were disclosed weeks ago by TheShadowBrokers, a mysterious hacking group. In what it said was a "highly unusual" step, Microsoft also agreed to provide the patch for older versions of Windows, including Windows XP and Windows Server 2003.
Burnett reported from Chicago and Breed from Raleigh, North Carolina.