>> Reuters can reveal for the first time that the Russian postal service was one of the largest victims of the Wanna Cry ransomware attack in Russia. I'm Reuters correspondent Jack Stubbs, here in Moscow. Employees have told us that the virus infected some of the automated queuing touch-screen terminals at a number of branches in Moscow.
This has obviously caused minimal disruption to the actual work of the postal service. But what it does illustrate is what analysts have said is a common misconception about the virus. That it is more likely to actually infect antiquated, out-of-date systems that are not seen as worth upgrading with the latest security patches.
As opposed to machines that are integral to the businesses, to the company's core business. Russian posts say there was no attack. They say the virus did not touch their systems, but that they turned off the automated queuing system as a precautionary measure for a temporary period of time last week.
However, we have spoken to multiple employees in branches across Moscow who say that they were told the virus infected these terminals. And I visited, also, a number of post office branches and saw that the terminals there were completely out of action. The infected Russian post terminals also ran on the Windows XP operating system which is no longer supported by Microsoft.
The fact that these infected computers were running on an out-of-date piece of software also points to a trend we're seeing in Russia, that the Wanna Cry virus was particularly successful here. Russian institutions were particularly susceptible because of the widespread use of outdated software and technology. Other victims have included the Interior Ministry, mobile phone operator, MegaFon, and also the Russian state rail network, Russian Railways.