Another major global Cyber attack on Tuesday.
Businesses in the Asia-Pacific region reported some disruptions on Wednesday with the operations of several European companies hit, including India's largest container port, although the impact on companies and governments across the wider region appeared to be limited.
The company denied any accidental involvement with the attack on its Facebook page, but Microsoft, security firm Talos, and Ukraine's own national cyber security department pinned the blame on the software. Even if they've been fixed they can still be affected. The infected computers displayed a message in red type over a black screen that read, "Oops, your important files are encrypted", demanding a $300 bitcoin ransom from users to recover the data.
The virus, which exploited a security gap in the world's most common operating system, Microsoft Windows, spread quickly this week, paralysing dozens of companies throughout Europe and the United States.
APM Terminals, owned by Maersk, is experiencing system issues at multiple terminals, including the Port of NY and New Jersey, the largest port on the US East Coast, and Rotterdam in The Netherlands, Europe's largest harbour.
Danish shipping giant A.P. Moller-Maersk said it was among the victims, reporting outages at facilities including its Los Angeles terminal.
It said: "None of Singapore's 11 Critical Information Infrastructure (CII) Sectors were affected; our government systems have not been affected".
In the United States, the offices of the law firm DLA Piper were affected, as were US-based pharmaceuticals giant Merck and U.S. food giant Mondelez, maker of Milka chocolate and Oreo cookies. Production at the Hobart factory on the island state of Tasmania ground to a halt late on Tuesday after computer systems went down.
It says so far there have been no reported local attacks. Cybersecurity firms have since renamed the malware.
Several major companies said Tuesday they were targeted in an worldwide cyberattack which started in Russian Federation and Ukraine before spreading to western Europe. The total number of attacks was unknown.
Ransomware victims are always advised not to pay ransom to get their files back because it encourage the attackers.
On Tuesday, NSA whistleblower Edward Snowden said that the Petya ransomware attack was made possible by a vulnerability in Windows software that the NSA had been secretly making use of for years as part of its spying operations. Spokesman Cyrille Gibot says that "like many other companies and institutions around the world, we are experiencing interference with some of our systems within the TNT network".
The cryptolocker demands $300 in bitcoins to let users access their data and does not name the encrypting program, which makes finding a solution hard.
The White House National Security Council said in a statement there was now no risk to public safety.