The intranet of Telefónica has suffered a major cyber attack this morning.

Telephone has been the victim this morning of a cyber attack that has been infected with ransomware some computers of their employees.

The incident has affected workers of the group’s headquarters in Madrid, known as the C district, and from the company have you ordered your employees to turn off their computers to be able to analyze the problem.

The crooks to require a ransom of $ 300 in bitcoins to release each computer infected by the ransomware.

From the technology company to have recognized the problem but have stressed that does not affect the business or the service you provide to their customers.

Also, with the passage of the morning it has been confirmed that the attack it has also occurred in other large organizations, report from the Center Cryptologic National CCN-CERT in the a press release.

“It has warned of a massive attack of ransomware to a number of organizations that affect Windows systems by encrypting all your files and network drives that are connected to, and infecting the rest of Windows systems on that same network”, exposed from the body.

in Addition, they reveal that “it is a version of the ransomware WannaCry, that infects the machine by encrypting all its files and, using a vulnerability execution of commands remotely via SMB is distributed to the rest of the Windows machines on that same network.”

From the we have talked with Andrés Núñez, director in Madrid of the company’s cybersecurity S2 Group, which has sent a message of tranquility, ensuring that “although we are dealing with a ransomware that is spread very fast, the attack is not for the leakage of information of Telefónica, and not been accessed to the data of the customers of the company“.

on the other hand, in the information of the CCN-CERT, state that they are vulnerable in the following versions of the Microsoft operating system (Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7, Windows 8.1, Windows RT 8.1, Windows Server 2012 and R2, Windows 10, and
Windows Server 2016).

finally, recommended update systems to the latest version or patch as reported by the manufacturer in the following official link, and systems without a stand or patch, such as Windows 7, advise to isolate from the network or turn off as the case may be.