>> Officials across the globe scrambling to catch the culprits behind a massive ransomware worm that infected hundreds of thousands of computers in more than 150 countries. While the attacks have slowed, cyber security experts warned the lull of the worm dubbed Wanna Cry may only be brief as fears of the new versions of the worm will strike.
As the malware spread across global networks, it hobbled big institutions and businesses, disrupting operations at car factories, hospitals, shops, and schools, and catching smaller victims across Asia. Some victims ignoring official advice and paying the $300 ransom demanded by the cyber criminals to unlock their computers. That ransom expected to double.
The virus hit computers running older versions of Microsoft software that had not recently been updated. Microsoft pinning blame on the US government. The company's president seeming to acknowledge what researchers already guessed, the war makes use of a hacking tool built by the NSA that leaked online in April.
In Asia, governments and businesses Monday that missed Friday's attack, now reporting disruptions from the worm. Reuters Adam Jordan is in Shanghai.>> People are returning to work on Monday, they're opening their computers, their emails. And for the unlucky few, they're clicking on these links which open up the ransomware worm and infect their computers.
What we've seen here in China is an impact especially on schools and colleges, where you have tens of thousands of students with laptops and relatively low levels of security.>> In the US, an official from the Department of Homeland Security says a small number of critical infrastructure operators have been affected.
But there has been no significant disruption in their work, nor any victims as of yet within the Federal Government. Homeland Security Advisor, Tom Bossert, saying that while the attackers are not yet known, they're likely criminal and not state sponsored. The global attacks spurring investors on Monday to buy up stocks expected to benefit from a pick up in cyber security spending by firms and government agencies.