WASHINGTON — It took months for federal authorities to identify the ransomware-infected software behind a string of cyberattacks on U.S. government organizations and banks, but they have identified one of the culprits.
Federal officials on Tuesday released a list of software and services that were infected in at least 15 ransomware attacks, mostly targeting federal government, banking and military entities.
It also included tools and software to help organizations keep themselves online and to identify potential cybercriminals.
The FBI and the Department of Homeland Security are investigating the attacks.
The FBI and DHS declined to release the names of the companies.
The names of some of the targeted companies and individuals were redacted in their statements to the House Homeland Security Committee.
The names of three other companies were redacted.
One of the targets, which has been reported as the WannaCry ransomware, was based in the Czech Republic and used a malicious file called .exe, the FBI said.
The other two attacks were based in Germany and were also believed to be carried out by the same actor, according to the FBI.
The three attacks were first reported in October and October was the period when the U.K. and U.A.E. were hit by ransomware attacks in which encrypted files were downloaded from the dark web.
The ransomware, named WannaCrypt, was distributed via a tool called Kaspersky Lab’s Zeus virus scanner.
The tool is a tool that detects software that may be used to distribute ransomware.
WannaCrack, the second ransomware-based infection, spread via an encrypted file.
A new version of the virus, called WannaTrojan, was released in April that encrypts files, but the FBI did not say when or where the Wannacrack was made.
WannaCry, which spread from the Czech region of Moravia, Czech Republic, to the U, A.E., B.C., Australia, Germany, France, Spain and Belgium, affected the U-A.A., B.-C., B-C.E.-G., B., and A.R.-G.
government departments and agencies in the U., A.B., C., D.C. and D.O.
Wannacry affected the government and private sector as well as the banking sector.
The U.N. General Assembly is set to vote on a resolution condemning the attacks on Tuesday.
“These attacks are just the latest in a long line of ransomware threats that have plagued our government and businesses,” said Sen. Ron Wyden, D-Ore., ranking member of the Senate Intelligence Committee.
“Our work to stop the spread of ransomware, including by leveraging the tools that our intelligence community is using, has only just begun.”
The FBI said it will take time to fully understand the details of the attacks, but it will continue to pursue all of the cybercrims behind these attacks, including the person or persons behind them.
It will also take time for our intelligence partners to identify, disrupt and recover any other ransomware threats, the agency said.