China Putting Stamp on Globalization With Belt and Road

Chinese President Xi Jinping says countries participating in the two-day Belt and Road Forum have agreed to an action plan with a list of 270 goals

Speaking at the end of the forum, China’s leader said the 30 heads of state who attended the summit in Beijing and nearby Yanqi Lake signed a communiqué to promote an open global economy, rebalance globalization, and deepen trade liberalization. 

Xi’s Belt and Road development initiative focuses on connectivity and cooperation among countries primarily China and the rest of Eurasia.  It includes the land-based “Silk Road Economic Belt” and the oceangoing “Maritime Silk Road”. 

The strategy underlines China’s push to take a bigger role in global affairs.  Xi stressed China would not base cooperation on ideology or use the Belt and Road to pursue a political agenda, allaying concerns of critics who have highlighted the massive project’s possible geopolitical impact.

“We have every reason to have full confidence in the prospects for the Belt and Road initiative,” Xi said.  “At the same time, the Belt and Road initiative is an expansive project and the road ahead is very long and cooperation is key.” 

Expansive Belt and Road 

Although many of the more than 100 countries and organizations participating in the summit welcome China’s efforts to boost trade and to play a bigger role in global affairs, participation in the forum was mixed.  Some countries sent representatives, but have yet to officially back the project.

The forum included representatives from the United States and North Korea. 

Countries such as the United States and Germany have emphasized the need for transparency and a level playing field. 

“Germany as a country has not asked to be a part of the initiative, but German companies have asked to be part of it,” said Brigitte Zypries, German Minister for Economic Affairs and Energy, who attended the forum.  “It is obviously relevant to know what is going to be built and the procedures to take part in this building are the same for every company and every country.” 

“The Belt and Road Initiative originates from China, but it belongs to the world,” Xi said, in remarks before the leaders’ summit Monday.  “The Belt and Road construction spans different regions, development phases and civilizations.  It is an open and inclusive cooperation platform.” 

Sunday, Xi outlined his vision for the plan and pledged to use development to fight a wide range of problems from terrorism to poverty.  Xi’s plan involves the creation of six economic corridors that would link China to 65 countries.  The participation of those countries would account for 60 percent of the world’s population and 30 percent of global GDP. 

An estimated $900 billion would be spent on connectivity projects across land and sea, making the Belt and Road initiative the most expensive development plan in history, several times larger than the U.S. Marshall Plan that was used to rebuild Europe after World War II. 

China has offered to shoulder a big slice of the responsibility, pledging $124 billion, which is double of what the World Bank lent in 2016.  Analysts said Beijing can easily bear the burden.  China has foreign exchange reserves exceeding $3 trillion.  Last year, Chinese companies invested $170 billion in overseas projects. 

Empire building 

Xi offered to establish 50 scientific laboratories with participating countries, train 5,000 foreign scientists and invited 500 foreign research groups to visit China.   The plan will also launch 100 “happy home” projects, 100 poverty alleviation projects and 100 health care and rehabilitation projects in countries along the Belt and Road, he said.  

But based on how the project has been outlined, China appears to be trying its hand at a new form of economic colonization, said Mohan Malik, a professor at the Institute of Asian Security in Hawaii. 

“China is in an empire-building mode: an empire of exclusive economic enclaves that would create a Sino-centric unipolar Asia,” Malik said in an emailed response.  “Chinese officials, in jest, talk of buying off smaller countries instead of invading them.” 

Malik adds that with its slowing economy, China risks “imperial overreach” with such a massive venture. 

David Kelly, director of research at the private China Policy consultants said if successful the outcome could be a positive thing, but the Belt and Road is swiftly becoming a measure of China’s global standing. 

“But if it doesn’t work, if it runs into problems, if it’s impractical, if it’s too costly, if it falls over, it will cost China’s standing in the world.  And that is what worries people because it is essentially an educated bet, an educated gamble,” Kelly said.

Study: Most Effective Measures Identified for Containing Ebola

A small outbreak of Ebola virus in Democratic Republic of the Congo is causing alarm among public health officials. A new study outlining containment strategies may help prevent an epidemic similar to the one that engulfed a number of western African countries two years ago.  

In the timely report, published in the journal Proceedings of the National Academy of Sciences, an international team of researchers culled 37 studies for the most effective containment strategies.

           

Pennsylvania State University biology professor Katriona Shea, co-author of the study, said, “The best strategy that we found out of the five that we looked at were funeral containment and public information campaigns [for the] sort of care in the community.”

Ebola virus is spread through coming into contact with the bodily fluids of infected individuals.

Shea said investigators found the No. 1 way to prevent transmission was for loved ones to avoid washing bodies of the deceased prior to burial.  

Shea said that information is best conveyed through public health campaigns that also stress the importance of handwashing, personal hygiene and self-quarantine in high-transmission areas.

Don’t wait to get treatment

People suspected of being infected with Ebola, the report found, should also not hesitate to go to the hospital or clinic for evaluation and treatment. But researchers concluded building more hospitals in response to an epidemic to be the least effective way to prevent spread of Ebola within communities.

Shea said investigators undertook the study in response to the Ebola epidemic of 2014-2015, when 28,646 people became infected. Of these, 11,323 people died in Guinea, Liberia and Sierra Leone died as of March 2016, according to the report.

Forty cases of the disease were also reported in the DRC.

Using the prevention strategies outlined in the study and the incidence data from the epidemic, researchers estimated that there would have been a reduction of 3,266 cases of Ebola and 1,633 lives saved.

No consensus on containment

At the height of the epidemic, Shea said there was no consensus on the best ways to contain the Ebola epidemic, and that’s why researchers decided to look into the matter.

“We really wanted to try to do something. Many of us have children, and were moved by stories, individual horrors and so forth,” she said. “Others of us felt something we did scientifically might contribute to making the future outbreaks less horrific.”

There are now three confirmed Ebola deaths in a remote part of the DRC. Public health officials are reportedly investigating a total of nine suspicious cases of the deadly viral infection.

With the virus once again threatening to become a public health menace, Shea said it’s not too early to begin taking aggressive measures to prevent another Ebola epidemic.

Anheuser-Busch Boosts Spending to Adapt to Fragmented Market

Anheuser-Busch is upgrading its U.S. breweries and plans to build two new distribution centers as it adapts to an increasingly fragmented beer market.

The maker of Budweiser, Corona, Stella Artois says the upgrades and new distribution centers in Los Angeles and Columbus, Ohio, will allow it to store a greater variety of products and get them to customers faster. The measures are part of the $500 million that the company said Monday it will invest in its U.S. operations this year, marking an increase compared with recent years. It’s a portion of the $3.7 billion in global capital expenditures that the Belgian company had already budgeted for 2017.

Anheuser-Busch has struggled to boost sales volumes as craft beers grow increasingly popular in an already crowded marketplace. In 2016, total volume at Anheuser-Busch declined 2 percent, including a 1.6 percent volume decline in North America.

The same thing is happening with non-alcoholic drinks. PepsiCo CEO Indra Nooyi has said the industry is becoming more “niche,” and that PepsiCo needs to learn how to thrive amid that growing complexity.

The investment announced Monday by Anheuser-Busch includes upgrades to breweries in Fort Collins, Colorado, and St. Louis, Missouri. The company did not say how many new jobs it expects this year’s U.S. investments to create. It has added around 2,500 jobs since 2013, the company said. Anheuser-Busch employs more than 17,000 people in the U.S.

In 2015, Anheuser-Busch had said it expects to invest $1.5 billion from that year to 2018. The Monday announcement was an update, with the company saying it is spending $2 billion from this year through 2020.

Man Thanks iPhone’s Siri for Saving His Life in Explosion

A New Hampshire man who was injured in a house explosion is thanking Siri for saving his life.

Christopher Beaucher says he was checking on his mother’s vacant cottage in Wilmot on May 1 when he saw something suspicious and went inside.

 

He tells WMUR-TV that when he switched on a light, the house exploded.

 

“The whole place caught fire,” Beaucher said. “Part of it collapsed while I was in it during the initial explosion, so I couldn’t really tell where I was.”

 

Beaucher’s face and hands were badly burned. He grabbed his cellphone but was unable to dial because of his injuries. He says he somehow asked his iPhone’s voice-controlled virtual assistant Siri to call 911, believing he was going into shock.

A spokeswoman for Apple said Monday that statistics on Siri being used for emergencies weren’t available, but noted some recent emergencies in which it was used. Those include three boaters off the Florida coast in April who used the water-resistant phone when their craft capsized; a 4-year-old boy from London who used his mother’s thumb to unlock her iPhone and called Siri after she collapsed at home in March; and a man in Vancouver who collapsed, became paralyzed, and was able to use his tongue to use Siri. 

 

Beaucher is undergoing treatment for his injuries and says he hopes to return to his job as a cook and tend to his farm.

 

“I’m very, very, extremely lucky to be alive,” he said.

 

The New Hampshire state fire marshal’s office is investigating the explosion.

Dubai Plans $1.7 Billion Tourist Project on New Artificial Islands

Dubai plans to develop a 6.3 billion dirham ($1.7 billion) tourist resort on two man-made islands it will build on either side of the Burj Al Arab, its luxury sail-shaped hotel.

It is the latest development planned by the emirate as it aims to attract 20 million visitors a year by 2020 when Dubai will host the World Expo 2020 exhibition.

Spanning 4 million square feet, Marsa Al Arab will be made up of two islands, one dedicated to entertainment and family tourism and the other featuring luxury villas and a private marina, state news agency WAM reported Monday.

Dubai is already one of the world’s most visited cities, although its hotels, shopping malls and state-owned airline, Emirates, have been buffeted by a strong U.S. dollar which has made the emirate pricier for many overseas visitors. The United Arab Emirates pegs its dirham to the dollar.

Around 4.6 million tourists visited Dubai during the first quarter, up by 11 percent compared to the same period of last year, according to Dubai Tourism data.

Marsa Al Arab will feature 140 villas, a marine and water park, and a theatre with capacity for 1,700 people to host Cirque du Soleil, local media reported. Work on the project will break ground in June and be completed by late 2020, WAM said.

The agency did not mention how the project would be funded.

Dubai is working on several big projects due for completion in the next few years and being funded by debt.

It is building the World Expo 2020 exhibition site, an extension to Dubai’s Metro system and Al Maktoum International Airport, a new airport being developed on the edge of Dubai, which will serve up to 146 million passengers by 2025.

Marsa Al Arab will add 2.2 km (1.4 miles) of beach to the emirate’s coastline, WAM said.

Dubai’s most famous artificial island, Palm Jumeriah, is home to several hotels, villas and apartments. But other islands it planned to develop were stalled or scaled back after the emirate’s 2009 debt crisis.

Palm Jebel Ali, which began construction in 2002, has yet to be completed, while plans for Palm Deira have been reworked to create a scaled-down project called Deira Islands.

Another man-made archipelago, The World, a 300-island chain laid out in the shape of the world’s continents, has only been partially developed.

Gingerly, Deals Start Taking Shape Between Rivals China and Vietnam

Historic rivals China and Vietnam are working on substantive agreements that could cover trade, investment and maritime resource sharing despite a bitter sovereignty dispute that had snarled relations less than a year ago.

The Communist neighbors are inching toward new trade and investment ties that analysts say would help shore up overall relations. Some believe the two might later approach stickier topics such as joint use of disputed waters or humane treatment of each other’s fishermen. The two countries still contest sovereignty over tracts of the vast, resource-rich South China Sea east of Vietnam and southwest of Hong Kong.

Prospects of some kind of agreement came into focus during Vietnamese President Tran Dai Quang’s visit to China, which ends Monday. He suggested the two sides work on complementing each other’s trade and investment advantages with a view toward improving overall relations, state media from Hanoi said.

“President Quang is in China, and China promised a lot,” said Yun Sun, senior associate with the East Asia Program under Washington-based think tank the Stimson Center. “From an economic point of view, it is certainly practical and beneficial for Vietnam to have some sort of deal, but then again I think this still relatively early to tell.”

In a meeting with Quang Thursday, Chinese President Xi Jinping called for more cross-border economic cooperation zones and joint infrastructure building, according to  China’s official Xinhua News Agency reported. China pledged to “mitigate” its trade deficit with Vietnam and increase direct investment, Sun said.

“Talking probably does help lower tensions and improve the odds of things happening,” said Alaistair Chan, an economist covering China for Moody’s Analytics.

The Vietnamese president suggested China finalize rules on opening the Chinese market for farm products, dairy and seafood, media outlet vietnamnet.vn said. He also called on China to make more “preferential loans” and urged a working group to develop renewable energy investment projects that play on China’s strengths and demand in Vietnam, the Vietnamese news report said.

On Friday companies from both countries signed agreements on milk distribution, tourism and rice processing.

China is the largest trade partner of Vietnam, with imports and exports worth about $72 billion last year. Vietnam also calls China one of the top 10 investors in the country.

But both countries are likely to hedge on letting outsiders invest in infrastructure, a possible source of direct investment, Chan said. “If they can get there purely on trade and stay away from investment, a touchy subject in both countries, I think that’s probably where they can get their quickest gain,” he said.

China and Vietnam stepped up dialogue after July 2016, when a world arbitration court ruled that Beijing lacked a legal basis to claim more than 90 percent of the sea, a boon to rival claimants in Southeast Asia: Vietnam, Brunei, Malaysia and the Philippines. China responded to the ruling by seeking one-on-one dialogue with each country. Vietnam was one of the most hostile toward China before the court ruling.

Beijing and Hanoi dispute sovereignty over much of the 3.5 million-square-kilometer sea, including two chains of tiny islets. Beijing’s go-ahead for a Chinese oil rig in contested waters set off a clash in 2014. The two countries also still face distrust fanned by centuries of political rivalry as well as a border war in 1979.

Both countries stake their fast-growing economies on export manufacturing. Vietnamese companies resent China for using their larger production scales to sell goods in bulk at relatively low prices.

Relations got a lift in September when the Chinese premier and Vietnamese prime minister agreed to manage maritime differences. Vietnamese Communist Party General Secretary Nguyen Phu Trong visited China in January to help smooth relations.

Another boost came as China emerged last year as the top single-country source of tourism for Vietnam. About 2.2 million Chinese visited Vietnam from January to October. Chinese tourists have reshaped the economies of Hong Kong and Taiwan over the past decade.

Agreements on managing disputed tracts of the South China Sea may come later if the two sides keep getting along, experts say.

Vietnam and China have agreed to an “informal” median line in the tract of sea where their claims overlap, said Carl Thayer, Southeast Asia-specialized emeritus professor of politics at The University of New South Wales in Australia. They might eventually work on expanding joint exploration for oil under the seabed and a way to ensure “humane” treatment of fishermen, he said.

“It’s to stop the ramming, boarding, seizing fish catches and radio equipment and in the old days taking them hostages for money,” Thayer said. Under a human treatment agreement, he said, “If you find them, you report them to the other side and return them rather than bash them up and take everything.”

Tiny Phytoplankton Threaten America’s Most Diverse Waterway

Florida’s Indian River lagoon is considered the most biologically diverse estuary in the Northern Hemisphere. But it is facing a serious threat to the plants and animals in its waters. The water’s surface is increasingly dotted with thousands of dead fish, manatees, birds and other creatures. Faiza Elmasry has more about the problem, the cause and the solution. VOA’s Faith Lapidus narrates.

WHO Confirms Second Ebola Case in Congo Outbreak

The World Health Organization (WHO) confirmed on Sunday a second case of Ebola in Democratic Republic of Congo after an outbreak this week of 17 other suspected cases.

Health officials are trying to trace 125 people thought to be linked to the cases identified in the remote northeastern province of Bas-Uele province in northeastern Congo near the border with Central African Republic, WHO’s Congo spokesman Eugene Kabambi said.

Three people have so far died among the 19 suspected and confirmed cases, he added.

It was not immediately clear how the first victim, a deceased male, caught the virus, although past outbreaks have been linked to contact with infected bush meat such as apes.

The outbreak comes just a year after the end of an epidemic in West Africa killed more than 11,300 people mostly in Guinea, Sierra Leone and Liberia.

However, Congo, whose dense forests contain the River Ebola near where the disease was first detected in 1976, has experienced many outbreaks and has mostly succeeded in containing them without large-scale loss of life.

The GAVI global vaccine alliance said on Friday some 300,000 emergency doses of an Ebola vaccine developed by Merck could be available in case of a large-scale outbreak and that it stood ready to support the Congo government on the matter.

5 Ways to Become a Smaller Target for Ransomware Hackers

This weekend’s global online extortion attack reinforces the need for businesses and other large organizations to update their computer operating systems and security software, cybersecurity experts said.

The attack largely infected networks that used out-of-date software, such as Windows XP, which Microsoft no longer offers technical support for.

“There’s some truth to the idea that people are always going to hack themselves,” said Dan Wire, a spokesman for security firm FireEye. “You’ve got to keep your systems updated.”

The attack that authorities say swept 150 countries this weekend is part of a growing problem of “ransomware” scams, in which people find themselves locked out of their files and presented with a demand to pay hackers to restore their access.

Hackers bait users to click on infected email links, open infected attachments or take advantage of outdated and vulnerable systems. This weekend’s virus was particularly virulent, because it could spread to all other computers on a network even if just one user clicked a bad link or attachment.

Lawrence Abrams, a New York-based blogger who runs BleepingComputer.com, says many organizations don’t install security upgrades because they’re worried about triggering bugs, or they can’t afford the downtime.

Here are five tips to make yourself a less-likely victim:

Make safe and secure backups

Once your files are encrypted, your options are limited. Recovery from backups is one of them. “Unfortunately, most people don’t have them,” Abrams says. Backups often are also out of date and missing critical information. With this attack, Abrams recommends trying to recover the “shadow volume” copies some versions of Windows have.

Some ransomware does also sometimes targets backup files, though.

You should make multiple backups — to cloud services and using physical disk drives, at regular and frequent intervals. It’s a good idea to back up files to a drive that remains entirely disconnected from your network.

Update and patch your systems

The latest ransomware was successful because of a confluence of factors. Those include a known and highly dangerous security hole in Microsoft Windows, tardy users who didn’t apply Microsoft’s March software fix, and malware designed to spread quickly once inside university, business and government networks. Updating software will take care of some vulnerability.

“Hopefully people are learning how important it is to apply these patches,” said Darien Huss, a senior security research engineer for cybersecurity firm Proofpoint, who helped stem the reach of the weekend attack. “I hope that if another attack occurs, the damage will be a lot less.”

The virus targeted computers using Windows XP, as well as Windows 7 and 8, all of which Microsoft stopped servicing years ago. Yet in an unusual step, they released a patch for those older systems because of the magnitude of the outbreak.

“There’s a lot of older Windows products out there that are `end of life’ and nobody’s bothered to take them out of service,” said Cynthia Larose, a cybersecurity expert at the law firm of Mintz Levin.

Use antivirus software

Using antivirus software will at least protect you from the most basic, well-known viruses by scanning your system against the known fingerprints of these pests. Low-end criminals take advantage of less-savvy users with such known viruses, even though malware is constantly changing and antivirus is frequently days behind detecting it.

Educate your workforce

Basic protocol such as stressing that workers shouldn’t click on questionable links or open suspicious attachments can save headaches. System administrators should ensure that employees don’t have unnecessary access to parts of the network that aren’t critical to their work. This helps limit the spread of ransomware if hackers do get into your system.

If hit, don’t wait and see

Some organizations disconnect computers as a precautionary measure. Shutting down a network can prevent the continued encryption — and possible loss — of more files. Hackers will sometimes encourage you to keep your computer on and linked to the network, but don’t be fooled.

If you’re facing a ransom demand and locked out of your files, law enforcement and cybersecurity experts discourage paying ransoms because it gives incentives to hackers and pays for their future attacks. There’s also no guarantee all files will be restored. Many organizations without updated backups may decide that regaining access to critical files, such as customer data, and avoiding public embarrassment is worth the cost.

Ryan O’Leary, vice president of WhiteHat Security’s threat research center, points out that this weekend’s hackers weren’t asking for much, usually about $300.

“If there is a silver lining to it, you’re not out a million dollars,” he said.

Still, “My answer is, never pay the ransom,” Abrams said. “But at the same time, I also know that if you’re someone who’s been affected and you’ve lost all your children’s photographs or you’ve lost all your data or you lost your thesis, sometimes $300 is worth it, you know?”

Europol says Global Cyberattack Affects 150 Countries

Europe’s police agency Europol says a global cyberattack has affected at least 100,000 organizations in 150 countries, with data networks infected by malware that locks computer files unless a ransom is paid.

Speaking to Britian’s ITV, Europol director Rob Wainwright said the healthcare sector in many countries is particularly vulnerable.  

So far there has been no progress reported in efforts to determine who launched the plot.

Computer security experts have assured individual computer users who have kept their PC operating systems updated that they are relatively safe.

They advised those whose networks have been effectively shut down by the ransomware attack not to make the payment demanded — the equivalent of $300, paid in the digital currency bitcoin, delivered to a likely untraceable destination that consists merely of a lengthy string of letters and numbers.  

However, the authors of the “WannaCry” ransomware attack told their victims the amount they must pay would double if they did not comply within three days of the original infection — by Monday, in most cases. And the hackers warned that they would delete all files on infected systems if no payment was received within seven days.

Avast, an international security software firm that claims it has 400 million users worldwide, said the ransomware attacks rose rapidly Saturday to a peak of 57,000 detected intrusions. Avast, which was founded in 1988 by two Czech researchers, said the largest number of attacks appeared to be aimed at Russia, Ukraine and Taiwan, but that major institutions in many other countries were affected.

‘Kill switch’ found

Computer security experts said the current attack could have been much worse but for the quick action of a young researcher in Britain who discovered a vulnerability in the ransomware itself, known as WanaCryptor 2.0.

The researcher, identified only as “MalwareTech,” found a “kill switch” within the ransomware as he studied its structure.

The “kill” function halted WanaCryptor’s ability to copy itself rapidly to all terminals in an infected system — hastening its crippling effect on a large network — once it was in contact with a secret internet address, or URL, consisting of a lengthy alphanumeric string.

The “kill” function had not been activated by whoever unleashed the ransomware, and the researcher found that the secret URL had not been registered to anyone by international internet administrators. He immediately claimed the URL for himself, spending about $11 to secure his access, and that greatly slowed the pace of infections in Britain.

Expects cautioned, however, that the criminals who pushed the ransomware to the world might be able to disable the “kill” switch in future versions of their malware.

Hackers’ key tool

WanaCryptor 2.0 is only part of the problem. It spread to so many computers so rapidly by using an exploit — software capable of burrowing unseen into Windows computer operating systems.

The exploit, known as “EternalBlue” or “MS17-010,” took advantage of a vulnerability in the Microsoft software that reportedly had been discovered and developed by the U.S. National Security Agency, which used it for surveillance activities.

NSA does not discuss its capabilities, and some computer experts say the MS17-010 exploit was developed by unknown parties using the name Equation Group (which may also be linked to NSA). Whatever its source, it was published on the internet last month by a hacker group called ShadowBrokers.

Microsoft distributed a “fix” for the software vulnerability two months ago, but not all computer users and networks worldwide had yet made that update and thus were highly vulnerable. And many computer networks, particularly those in less developed parts of the world, still use an older version of Microsoft software, Windows XP, that the company no longer updates.

The Finnish computer security firm F-Secure called the problem spreading around the world “the biggest ransomware outbreak in history.” The firm said it had warned about the exponential growth of ransomware, or crimeware, as well as the dangers of sophisticated surveillance tools used by governments.

Lesson: Update programs

With WanaCryptor and MS17-010 both “unleashed into the wild,” F-Secure said the current problem seems to have combined and magnified the worst of the dangers those programs represent.

The security firm Kaspersky Lab, based in Russia, noted that Microsoft had repaired the software problem that allows backdoor entry into its operating systems weeks before hackers published the exploit linked to the NSA, but also said: “Unfortunately it appears that many users have not yet installed the patch.”

Britain’s National Health Services first sounded the ransomware alarm Friday.

The government held an emergency meeting Saturday of its crisis response committee, known as COBRA, to assess the damage. Late in the day, Home Secretary Amber Rudd said the NHS was again “working as normal,” with 97 percent of the system’s components now fully restored.

Spanish firm Telefonica, French automaker Renault, the U.S.-based delivery service FedEx and the German railway Deutsche Bahn were among those affected.

None of the firms targeted indicated whether they had paid or would pay the hackers ransom.

 

WHO to Vote for New Director-General; David Nabarro Wants the Job

Dr. David Nabarro says he wants to rid the world of two diseases that are close to being eradicated: polio and guinea worm. Polio exists mainly on the Pakistani-Afghan border and in northern Nigeria. Both are conflict zones, where vaccine workers risk their lives to immunize children.

“The last part of eradicating any disease is always the hardest part,” Nabarro said during a visit to VOA. “If you don’t do it, you lose everything. To do it, you’ve got to really bring all the energy and commitment you can to bear.”

The World Health Organization has worked to eliminate polio for more than 30 years. Nigeria was to be declared polio-free this year, meaning the country had no cases for three continuous years, but then the disease returned.

“We must remain vigilant and focused until we are certain that the last case has been found and that we have got everybody protected,” Nabarro said.

Watch: WHO to Vote on New Director-General; David Nabarro Wants the Job

Guinea worm

Nabarro also wants to rid the world of Guinea worm, a disease that starts when people drink water containing fleas infected with guinea worm larvae. The larvae grow in human intestines. And while it is not life-threatening, it is painful when the worm emerges.

In 1986, about 3.5 million people had Guinea worm disease. Last year, 25 people had it. This was the result of efforts by United Nations agencies, the Carter Center, which was founded by former U.S. President Jimmy Carter, and the U.S. Centers for Disease Control and Prevention.

Nabarro wants to make more inroads in ending malaria, a disease that threatens nearly half the world’s population. Even through malaria can be prevented and cured, the WHO says it caused nearly half a million deaths in 2015.

Ebola epidemic

During the Ebola epidemic, Nabarro visited the West African countries ravaged by the disease as the U.N. special envoy on Ebola. It took the world a long time to put together an effective response to the epidemic, and before it was over more than 11,000 people died.

The WHO was heavily criticized for the way it handled the pandemic. Nabarro wants to make sure a tragedy of this magnitude does not happen again because of a lack of preparedness.

“I want to be sure the world as a whole helps nations to respond quickly when there’s a threat of infection. Usually, that means that the problem doesn’t get out of control,” he told VOA.

Life of public health service

Nabarro has spent his life working in public health. He worked in Iraq with Save the Children in 1974. He continued to work in public health positions until he joined the World Health Organization in 1999 and has worked at the WHO and for the U.N. since then. Nabarro has worked on malaria programs.

Now, he hopes to be elected director-general of the World Health Organization when the World Health Assembly meets in Geneva May 23.

This is the first time candidates will be elected to become director-general of WHO by member nations.

WHO to Vote on New Director-General; David Nabarro Wants the Job

Dr. David Nabarro says he wants to rid the world of two diseases that are close to being eradicated: polio and guinea worm. During a visit to VOA, he also said he wants to work to end malaria if he becomes the next head of the World Health Organization. This is the first time candidates will be elected to become director-general of WHO. VOA’s Carol Pearson has more.

Factbox: Ebola Virus Outbreaks in Africa

Democratic Republic of Congo Ebola Outbreak

On May 13, the World Health Organization declared an Ebola outbreak in Bas-Uele province, in the Democratic Republic of the Congo, after a person tested positive for the Ebola virus.

The last Ebola outbreak in Congo happened in 2014 and killed more than 40 people.

In 2013, an Ebola crisis began in Guinea, Sierra Leone and Liberia.

Congo’s outbreaks have all been in areas not linked to the West African cases.

2013-16 Western Africa Ebola Outbreak

Where: Guinea, Liberia, Sierra Leone

Began: December 2013

Ended*: March 2016

* WHO declared the outbreak in West Africa a public health emergency in August 2014. It declared the end of the transmission of Ebola in Guinea in December 2015, Liberia in January 2016 and in Sierra Leone in March 2016.

Even after the last transmission, WHO warned the countries were still at risk of sporadic transmission of Ebola because of the presence of the virus in some survivors.

WHO noted flare-ups of Ebola cases in Guinea in March 2016 and Liberia in June 2016.

2013-16 West Africa Ebola Outbreak, Death Tolls*

Guinea                 3,814 cases         2,544 deaths

Liberia                10,678 cases        4,810 deaths

Sierra Leone      14,124 cases        3,956 deaths

Total                      28,616 cases       11,310 deaths

Source: U.S. Centers for Disease Control and Prevention

* The 2013-16 West Africa Ebola outbreak was the largest in history.

Ebola Symptoms

Symptoms of the virus may include:

Fever

Severe headache

Muscle pain

Weakness

Fatigue

Diarrhea

Vomiting

Abdominal (stomach) pain

Unexplained hemorrhage (bleeding or bruising)

* Symptoms may appear anywhere from two to 21 days after exposure to Ebola, but the average is eight to 10 days.

Prevention

Avoid areas of known outbreaks

Wash hands frequently

Avoid bushmeat

Take precautions and avoid direct contact with infected people

* There is no known treatment for Ebola. Symptoms of Ebola and complications are treated as they appear.

Global Cyberattack in Brief: Ransomware, a Vision of Future?, Seeking Culprits

In what is believed to be the largest attack of its kind ever recorded, a cyberextortion attack continued causing problems Saturday, locking up computers and holding users’ files for ransom at dozens of hospitals, companies and government agencies. Businesses and computer security organizations await problems in the new workweek.

Ransomware Attack Could Herald Future Problems — Tech staffs around the world worked around the clock this weekend to protect computers and patch networks to block the computer hack whose name sounds like a pop song — “WannaCry” — as analysts warned the global ransomware attack could be just the first of a new wave of strikes by computer criminals.

Worldwide Cyberattack Spreads Further in Second Day — A cyberattack against tens of thousands of data networks in scores of countries, all infected by malware that locks computer files unless a ransom is paid, spread further in its second day Saturday, with no progress reported in efforts to determine who launched the plot.

Authorities Seek Clues On Culprits Behind Global Cyberattack — The British government said on Saturday it does not yet know who was behind a massive global cyberattack that disrupted Britain’s health care services, but Interior Minister Amber Rudd said the country’s National Crime Agency is investigating where the attacks came from.

Europol Working on Probe Into Massive Cyberattack — The European Union’s police agency, Europol, says it is working with countries hit by the global ransomware cyberattack to rein in the threat and help victims.

‘Perfect Storm’ of Conditions Helped Cyberattack Succeed — The cyberextortion attack that hit dozens of countries spread quickly and widely thanks to an unusual confluence of factors: a known and highly dangerous security hole in Microsoft Windows, tardy users who didn’t apply Microsoft’s March software fix, and a software design that allowed the malware to spread quickly once inside university, business and government networks.

Where Global Cyberattack Has Hit Hardest — A look at some of the countries and organizations hardest hit during the global cyberattack.

What Is the Digital Currency Bitcoin? — In the news now after a cyberextortion attack this weekend, bitcoin has a fuzzy history, but it’s a type of currency that allows people to buy goods and services and exchange money without involving banks, credit card issuers or other third parties.

 

Congo Faces New Ebola Outbreak

The World Health Organization says the Democratic Republic of the Congo is again facing an outbreak of the contagious and deadly Ebola virus.

Congolese Health Minister Oly Ilunga announced Saturday that three people had died of the virus in the northeast of the country.

Ilunga urged people not to panic and said officials had taken all necessary measures to respond to the outbreak.

The World Health Organization said it was working with Congolese authorities to deploy health workers in the remote area where the three deaths occurred, all on April 22. Eleven other cases are suspected in the area.

WHO’s regional director for Africa, Matshidiso Moeti, went to the Congolese capital, Kinshasa, on Friday to discuss disease response.

The remoteness of the affected area, 1,300 kilometers from Kinshasa, means word of the outbreak was slow to emerge. WHO said specialist teams were expected to arrive in the area, known as the Likati health zone, within the next day or two.

This was the first outbreak of the virus in DRC since 2014, when 49 people died of Ebola.

Larger outbreak

Experts say the 2014 DRC outbreak was not linked to a much larger outbreak that killed 11,000 people in Guinea, Sierra Leone and Liberia, beginning in 2013. They say active virus transmission for that outbreak was halted last year.

In December 2016, The Lancet, a medical journal, published results of a WHO-led trial  showing that the world’s first Ebola vaccine provides substantial protection against the virus. Among more than 11,000 people who were vaccinated in the trial, no cases of Ebola virus disease occurred.

Reports say the vaccine is now awaiting formal licensing clearance.

Ebola, named for the Congolese river near where it was first identified in 1976, begins with a sudden fever, aching muscles, diarrhea and vomiting. It is a hemorrhagic fever, marked by spontaneous bleeding from internal organs and, in most cases, death. It can be transmitted by close contact with infected animals or people, usually through blood or other bodily fluids.

People can contract the virus through direct contact with victims’ bodies at funerals. Caretakers, nurses and doctors treating Ebola patients also are at high risk.

Where Global Cyberattack Has Hit Hardest

Here is a look at some of the places hit by the global cyberattack.

European Union — Europol’s European Cybercrime Center, known as EC3, said the attack “is at an unprecedented level and will require a complex international investigation to identify the culprits.”

Britain — Britain’s home secretary said the “ransomware” attack hit one in five of 248 National Health Service groups, forcing hospitals to cancel or delay treatments for thousands of patients — even some with serious aliments like cancer.

Germany — The national railway said Saturday departure and arrival display screens at its train stations were affected, but there was no impact on actual train services. Deutsche Bahn said it deployed extra staff to help customers.

Russia — Two security firms — Kaspersky Lab and Avast — said Russia was hit hardest by the attack. The Russian Interior Ministry, which runs the country’s police, confirmed it was among those that fell victim to the “ransomware,” which typically flashes a message demanding payment to release the user’s data. Spokeswoman Irina Volk was quoted by the Interfax news agency Saturday as saying the problem had been “localized” and that no information was compromised. Russia’s health ministry said its attacks were “effectively repelled.”

United States — In the U.S., FedEx Corp. reported that its Windows computers were `”experiencing interference” from malware, but wouldn’t say if it had been hit by ransomware. Other impacts in the U.S. were not readily apparent.

Turkey — The head of Turkey’s Information and Communication Technologies Authority or BTK says the nation was among those affected by the ransomware attack. Omer Fatih Sayan said the country’s cyber security center is continuing operations against the malicious software.

France — French carmaker Renault’s assembly plant in Slovenia halted production after it was targeted. Radio Slovenia said Saturday the Revoz factory in the southeastern town of Novo Mesto stopped working Friday evening to stop the malware from spreading.

Brazil — The South American nation’s social security system had to disconnect its computers and cancel public access. The state-owned oil company Petrobras and Brazil’s Foreign Ministry also disconnected computers as a precautionary measure, and court systems went down, too.

Spain — The attack hit Spain’s Telefonica, a global broadband and telecommunications company.

Ransomware Attack Could Herald Future Problems

Tech staffs around the world worked around the clock this weekend to protect computers and patch networks to block the computer hack whose name sounds like a pop song — “WannaCry” — as analysts warned the global ransomware attack could be just the first of a new wave of strikes by computer criminals.

The United States suffered relatively few effects from the ransomware that appeared on tens of thousands of computer systems across Europe and into Asia, beginning Friday. Security experts remained cautious, however, and stressed there was a continuing threat.

In contrast to reports from several European security firms, a researcher at the Tripwire company on the U.S. West Coast said late Saturday that the attack could be diminishing.

“It looks like it’s tailing off,” said Travis Smith of Tripwire.

“I hope that’s the case,” Smith added. The Oregon firm protects large enterprises and governments from computer security threats.

Ransomware attack

The code for the ransomware unleashed Friday remains freely available on the internet, experts said, so those behind the WannaCry attack — also known as WanaCryptor 2.0 and a variety of other names — could launch new strikes in coming days or weeks. Copycat attacks by other high-tech criminals also are possible.

“We are not out of the woods yet,” said Gary Davis, chief consumer security evangelist at McAfee, the global computer security software company in Santa Clara, California. “We think it’s going to be the footprint for other kinds of attacks in the future.”

The attack hit scores of countries — more than 100, by some experts’ count — and infected tens of thousands of computer networks.

Industry reports indicate Russia, Taiwan, Ukraine and Britain were among the countries hit hardest, and more hacking reports can be expected when offices reopen for the new workweek Monday or, in some parts of the world, Sunday.

One of the weapons used in the current attack is a software tool reportedly stolen from the U.S. National Security Agency and published on the internet by hackers last month.

The tool affords hackers undetected entry into many Microsoft computer operating systems, which is what they need to plant their ransomware. However, Microsoft issued patches to fix that vulnerability in its software weeks ago that could greatly reduce the chances of intrusion.

Outdated operating systems

The crippling effects of WannaCry highlight a problem that experts have long known about, and one that appears to have hit developing countries harder.

Some organizations are more vulnerable to intrusion because they use older or outdated operating systems, usually due to the cost of upgrading software or buying modern hardware needed to install better-protected operating systems. Companies like Microsoft eventually stop updating or supporting older versions of their software, so customers using those programs do not receive software patches or security upgrades.

Much of the ransomware’s spread around the world occurred without any human involvement. The WannaCry malware self-propagates, copying itself to all computers on a network automatically.

When a demand for ransom payments appears on a user’s screen — $300 at first, doubling to $600 in a few days — it’s usually too late: All files on that computer have been encrypted and are unreadable by their owners.

The hackers said they would reverse the effect of their software once they received the payments they demanded.

Microsoft patched the “hole” in the newest versions of its operating software — Windows 10 for most home users — in March, three weeks before the stolen NSA exploit software was published on the internet. Since Friday, the company dropped its refusal to update old versions of its programs and issued patches specifically written for use in Windows XP and several other systems.

Microsoft declined a request for an interview, but a statement on the company’s blog said: “Seeing businesses and individuals affected by cyberattacks, such as the ones reported today, was painful. We are taking the highly unusual step of providing a security update for all customers to protect Windows platforms that are in custom support only, including Windows XP, Windows 8, and Windows Server 2003.”

“A lot of people in the security community were impressed with Microsoft’s speed, but it highlights an ongoing challenge we have,” said Stephen Cobb, a senior security researcher with ESET, a global security software company. “If a malicious code outbreak breaks out tomorrow, and targets unsupported operating systems, Microsoft may have to go there again.”

Insecurity Creates Challenges for HIV Treatment in Southeast C.A.R.

Violence in the southeastern part of the Central African Republic, where five U.N. peacekeepers were killed this month, has made it tougher for HIV-positive residents in the remote, lawless region to get treatment.

The prevalence rate of HIV in southeastern C.A.R. is 13 percent, nearly three times the national average.

The migration of people between the bordering areas of South Sudan and the Democratic Republic of the Congo contributes to the spread of the disease in all three countries.

“Here, it’s a crossing where everything converges. It’s why the level of HIV is high,” said Bienvenu Sapioko, a government nurse who works at the only hospital in Zemio. He said the rebels and refugees in the area also increase the high prevalence.   

An internal U.N. report obtained by VOA found HIV rates increased following the arrival of the Ugandan security forces in the C.A.R. in 2009. The Ugandan and American forces tasked with tracking down Joseph Kony and his Lord’s Resistance Army ended their mission in April and are heading home.

With prostitution, polygamy and effectively no state authority in the area, weak education contributes to the problem.  

Stigma, superstition

“People believe in the power of nature and traditional doctors. So bush doctors, shamans are also very common in the community,” said Olivier Pennec, the Doctors Without Borders project coordinator in Zemio.

Stigma compounds the problem.

“Before, the people didn’t treat themselves. The people would hide the microbes, this disease,” said Marcel Elonga, a community leader. They would hide and “speak about this parasite, parasite, parasite.”

HIV-positive people in local communities can also find themselves shunned by their peers.

“They don’t want him in the community,” community leader Pierre Yakanza said, describing how some people here see an HIV-positive person. “They don’t want to be close to him. ‘Leave him over there. We don’t want to associate with him or have him in the community meetings or give him a job.’ He’s rejected.”

Local health workers spread information about safe sex, but even access to condoms remains a challenge.

Treatment available

More than 1,500 people now come to Zemio’s hospital from nearby and as far away as Uganda, South Sudan and the Democratic Republic of the Congo for the free HIV treatment offered by Doctors without Borders.

Hospital officials said previously one person would die every month or so from the disease, but they haven’t registered a death since 2014.  

In 2012, Agnes Davouragouni said she used to be sick all the time.  

“When I did the test and found out I was positive, my husband said he doesn’t have HIV, so he left me the same day,” said the 35-year-old woman, who now lives alone with her three children, selling wood and charcoal to get by.

Once a year, Davouragouni walks 45 kilometers to Zemio over the course of two days in order to get a checkup as part of her treatment.  She walks mostly at night and sleeps under a tree along the way.   

“The roads are very insecure. I don’t have a motorcycle or the money to pay to get here,” she said. “There’s a lot of fear to travel on these roads.”

Bandits and rebel groups, including the remnants of the Lord’s Resistance Army, all move around the area. The security void will worsen with the departure of Ugandan and American forces in the next few months.

Group efforts

Recognizing the challenges of getting medication, Doctors Without Borders developed a new community approach in which HIV-positive patients work in groups to bring back antiretroviral drugs in bulk every six months, reducing travel time, costs and exposure to risk.

Farmer Moïse Ouele picks up the antiretroviral drugs for his group of about 30 people and drives them  two hours down the road to his village Kitesa, about 50 kilometers away.

“It was really tiring for me to come each month to the hospital,” Ouele said. “But now, this program helps a lot with this problem, despite the insecurity of the LRA that is growing.”

Doctors Without Borders is transitioning out of the area at the end of the year and is handing over the administration of the program to the Ministry of Health.

Authorities Seek Clues On Culprits Behind Global Cyberattack

The British government said on Saturday it does not yet know who was behind a massive global cyberattack that disrupted Britain’s health care services and targeted vital computer systems in as many as 100 other countries.

British Interior Minister Amber Rudd said Britain’s National Cyber Security Center was working with the country’s health service to ensure the attack that began Friday was contained and limited.

She said Britain’s National Crime Agency was still working with her ministry to find out where the attacks came from and that the British government did not know if the attacks had been directed by a foreign government.

What appeared to be the biggest cyberextortion attack in history exploited a vulnerability in Microsoft Windows that was identified in leaked documents by the U.S. National Security Agency earlier this year.

With more than 75,000 attacks launched on Friday, cybercrime experts around the world were investigating a concentration of attacks in Russia, Ukraine, and India — countries where the use of older, unpatched versions of Microsoft Windows is widespread.

The hackers attempt to trick victims into opening malicious attachments to spam e-mails by saying they contained invoices, job offers, security warnings, and other seemingly legitimate files.

The extortionists demand payments of $300 to $600 to restore access once computers are crippled by the scam. Cybersecurity firms said criminal organizations were probably behind the attack.

Russia’s Interior Ministry, Emergencies Ministry, and biggest bank, Sberbank, were all targeted, officials said.

The Interior Ministry said on its website that around 1,000 computers had been infected, but it had localized the virus. Russia’s Investigative Committee denied reports that it was attacked.

Russia’s Health Ministry and Emergencies Ministry told Russian news agencies that they had repelled the cyberattacks, while Sberbank said its cybersecurity arrangements had prevented viruses from entering its systems.

Russia’s Central Bank said Saturday that it detected massive cyberattacks on domestic banks, but the resources of the Central Bank itself were “not compromised.”

Megafon, a top Russian mobile operator, said it had come under attacks that appeared similar to those that crippled U.K. hospitals. A spokesman said mobile communications weren’t affected but the attacks interrupted the work of its call centers.

Hospitals ‘Crippled’

Spain and the United Kingdom were hit particularly hard. Hospitals across Britain found themselves without access to their computers or phone systems. Many canceled routine procedures and asked patients not to come to the hospital unless it was an emergency. 

British Prime Minister Theresa May said that, while some hospitals were crippled, there was no evidence patient data had been compromised.

Spain’s giant Telefonica telecommunications company was hit, prompting Spanish authorities to take measures to protect critical infrastructure in transportation, energy, telecommunications, and financial services.

Only a small number of U.S. organizations were hit because the hackers appear to have begun their campaign in Europe, cybersecurity firms said.

By the time the hackers turned their attention to the United States, spam filters had identified the new threat and flagged the ransomware-laden emails as malicious.

The security holes exploited by the hackers were disclosed several weeks ago by TheShadowBrokers, a mysterious group that has published what it says are hacking tools used by the White House security agency as part of U.S. intelligence-gathering.

Microsoft said it was pushing out automatic Windows updates to defend clients from the virus.

Some material for this article came from AP, BBC, AFP, Reuters, Tass and Interfax.

Mnuchin Says G-7 Nations More Comfortable With New US Economic Approach

U.S. Treasury Secretary Steven Mnuchin said Saturday after meeting with officials from the world’s other industrialized democracies that he thought they were more at ease with Donald Trump’s economic policies.

“People are more comfortable today, now that they’ve had the opportunity to spend time with me and listen to the president and hear our economic message,” Mnuchin said after a two-day meeting in Bari, Italy, with members of the Group of Seven, industrialized nations commonly known as the G-7.

Officials from the G-7 countries hoped to learn more about the U.S. president’s plans, which they feared would revive protectionist policies and result in a global regression on issues such as banking reform and climate change.

After the meeting, officials from Japan and member European countries remained concerned about the economic shift in Washington, particularly after Mnuchin said the U.S. reserved the right to be protectionist if it thought trade was not free or fair.

“All the six others … said explicitly, and some very directly, to the representatives of the U.S. administration that it is absolutely necessary to continue with the same spirit of international cooperation,” said French Finance Minister Michel Sapin.

Don’t ‘backpedal’ on free trade

Bank of France Governor Francois Villeroy de Galhau said continued uncertainty about U.S. policy could dampen optimism within the G-7 about the global economy’s gradual recovery from the financial crisis that began nearly a decade ago.

De Galhau echoed the sentiments of Japanese Finance Minister Taro Aso, who said, “We must not backpedal on free trade, as it has contributed to economic prosperity.”

European officials complained that the U.S. meaning of “fair trade” remained unclear and that the only way to establish fairness was to abide by the multilateral framework developed by the World Trade Organization.

A senior Japanese Finance Ministry official said the most significant question pertained to Trump’s U.S. tax cut proposal that could fuel America’s economic recovery.

Trump has proposed slashing the U.S. corporate income tax rate and offer multinational businesses a steep tax break on overseas profits brought back to the U.S.

The G-7 is composed of Britain, Canada, France, Germany, Italy, Japan and the U.S.

Global Cyberattack in Brief: Ransomware Attack, How Does It Work, How to Prevent It

In what is believed to be the largest attack of its kind ever recorded, a cyberextortion attack struck in dozens of countries Friday, locking up computers and holding users’ files for ransom at dozens of hospitals, companies and government agencies.

Massive Cyberattack Hits Organizations Around Globe — An aggressive wave of cyberattacks has hit companies and public institutions around the globe, causing international havoc and bringing many services to a standstill. The cyberextortion attempt appeared to use stolen software developed by a U.S. spy agency.

What You Need to Know About Ransomware — What is ransomware? How does it infect your computer? How is the U.S. government’s National Security Agency involved? How to keep your computer safe.

Global Cyberattack Fuels Concern About US Vulnerability Disclosures — A global cyberattack on Friday renewed concerns about whether the U.S. National Security Agency and other countries’ intelligence services too often horde software vulnerabilities for offensive purposes, rather than quickly alerting technology companies to such flaws.

Companies Affected by Global Cyber Attack — A global cyber attack on Friday affected British hospitals, government agencies and companies, such as FedEx Corp., Telefonica SA, Portugal Telecom and Telefonica Argentina, in 99 countries, with Russia, Ukraine and Taiwan the top targets.

Don’t Click: What Is the ‘Ransomware’ WannaCry Worm? — What is so special about WannaCry?

Don’t Click: What Is the ‘Ransomware’ WannaCry Worm?

Malicious software called “ransomware” has forced British hospitals to turn away patients and affected Spanish companies such as Telefonica as part of a global outbreak that has affected tens of thousands of computers.

How does it work?

WannaCry — also known as WanaCrypt0r 2.0, WannaCry and WCry — is a form of “ransomware” that locks up the files on your computer and encrypts them in a way that you cannot access them anymore.

How does it spread?

Ransomware is a program that gets into your computer, either by clicking on the wrong thing or downloading the wrong thing, and then it holds something you need to ransom.

In the case of WannaCry, the program encrypts your files and demands payment in bitcoin in order to regain access.

Security experts warn there is no guarantee that access will be granted after payment. Some ransomware that encrypts files ups the stakes after a few days, demanding more money and threatening to delete files altogether.

There are different variants of what happens: Other forms of ransomware execute programs that can lock your computer entirely, only showing a message to make payment in order to log in again. There are some that create pop-ups that are difficult or impossible to close, rendering the machine difficult or impossible to use.

Where has it spread?

British-based cyber researcher Chris Doman of AlienVault said the ransomware “looks to be targeting a wide range of countries,” with initial evidence of infections in at least two dozen nations, according to experts from three security firms.

The broad-based ransomware attack has appeared in at least eight Asian nations, a dozen countries in Europe, Turkey and the United Arab Emirates and Argentina, and appears to be sweeping around the globe, researchers said.

What is so special about WannaCry?

WannaCry is not just a ransomware program, it is also a worm.

This means that it gets into your computer and looks for other computers to try and spread itself as far and wide as possible.

Ransomware has a habit of mutating, so it changes over time in order to find different ways to access computers or to get around patches (operating system updates that often include security updates). Many security firms are already aware of WannaCry in past forms and most are looking at this one right now to see how it might be stopped.

Several cybersecurity firms said WannaCry exploits a vulnerability in Microsoft and that Microsoft patched this in March. People don’t always install updates and patches on their computers, and so this means vulnerabilities can remain open a lot longer and make things easier for hackers to get in.

It exploited a vulnerability in the Windows operating system believed to have been developed by the National Security Agency, which became public last month. It was among a large number of hacking tools and other files that a group known as the Shadow Brokers released on the internet. Shadow Brokers said that they obtained it from a secret NSA server.

The identity of Shadow Brokers is unknown, though many security experts believe the group that surfaced in 2016 is linked to the Russian government.

The NSA and Microsoft did not immediately respond to requests for comment.