The attack has hit Ukraine particularly hard. The post said the block happened around midday in Germany, well before reports began circulating about problems linked to its spread.
The facility, called Gateway Terminal India, could not identify which shipment belonged to whom, Ms Prasad said.
Russia’s central bank said there had been “computer attacks” on Russian banks and that in isolated cases their IT systems had been infected.
On Tuesday, June 27, various European companies and government agencies reported being hit by a form of ransomware known as Petya or Petrwrap.
In a lengthier statement posted to Facebook, however, the company said that it was not responsible for having seeded the rogue program.
“Based on observed in-the-wild behaviors, the lack of a known, viable external spreading mechanism and other research we believe it is possible that some infections may be associated with software update systems for a Ukrainian tax accounting package called MeDoc”, a Talos blog entry stated.
There were signs the virus was starting to spread in China but no large-scale outbreak had been detected, according to Zheng Wenbin, chief security engineer at Qihoo 360 Technology Co.
Other firms affected include United Kingdom media agency, WPP, Russian oil firm Rosneft, and several government organizations in the Ukraine, including the agency responsible for monitoring the Chernobyl nuclear plant, which reverted to manually monitoring radiation due Windows system shutdowns.
Security software vendor McAfee said that the modified Petya attack had more potential to hit the general public than WannaCry, but that it had so far been mainly detected in business environments.
Russia’s Rosneft, one of the world’s biggest crude producers by volume, said its systems had suffered “serious consequences” from the attack. The company’s website was not working Tuesday evening. But she said she was told some other patients’ procedures had to be rescheduled.
In the U.K., British advertising agency WPP has had its systems disrupted, while French construction materials company St Gobain also reported being attacked. Meanwhile, antivirus provider Avast said that it has detected more than 12,000 instances of the ransomware around the world.
“We are continuing to investigate and will take appropriate action to protect customers”, a spokesman for the company said, adding that Microsoft antivirus software detects and removes it. Maersk, a Danish transport and energy conglomerate, announced that “Maersk IT systems are down across multiple sites and business units due to a cyber attack”. Some U.S. companies, including food producer Mondelēz worldwide and drug-maker Merck, were also affected.
Mondelēz said it experienced “a global IT outage”.
“We confirm our company’s computer network was compromised today as part of global hack”, Merck said on Twitter.
The virus used is similar to the ransomware attack last month that infected more than 300,000 computers, according to cybersecurity experts.
What makes the latest attack, a clone of the GoldenEye variant of the Petya family, even worse is how it operates: Using the same security flaw that enabled WannaCry to infect computers.
“The criminals behind this attack are asking for $300 in Bitcoins to deliver the key that decrypts the ransomed data, payable to a unified Bitcoin account”, Kaspersky said in a news update late Tuesday afternoon, noting that the culprits asked victims to send electronic payment via email.