By 20:00 on 13 of May, hundreds of thousands computers from 29,372 institutions have been attacked by the ransomware.
"Insurance cover only takes care of data or financial loss.
In case the client is using pirated or old software which is making them victim to cyber crime, no money will be paid", said a senior executive of a private insurance company who also said there is a spike in queries of cyber insurance.
America's National Security Agency (NSA) should accept partial blame for the WannaCry ransomware cyberattack which has infected more than 300,000 computers in 150 countries, according to Chinese state media.
Microsoft had patched the vulnerability exploited in WannaCry attacks with the March 2017 Patch Tuesday cycle, so all systems running Windows 7, Windows 8.1, and Windows 10 were already secure when the WannaCry ransomware dropped bombs on unsuspecting systems last week.
Microsoft should know that there are people, small businesses, schools and hospitals that still use older version of Windows, such as XP (which came out in 2001).
If the attackers hit critical national infrastructure and cause death and destruction, then you enter the realm of the War Powers Act and post 9/11 legislation, as well as the core presidential authority to pursue the attackers and country housing them.
"The weaknesses exploited by the virus which attacked computers all over the world and paralyzed the work of many large companies do not exist in the banking group's systems", it said in response to a request for comment. In Windows XP these numbers are not deleted from the computer's memory at the end of the process, although they can be overwritten. Low-end criminals take advantage of less-savvy users with such known viruses, even though malware is constantly changing and antivirus is frequently days behind detecting it. "One should avoid clicking on unknown and suspicious download links", the SP added. Overworked systems administrators work within limited budgets. This helps limit the spread of ransomware if hackers do get into your system. On Friday, it reported 16 computer networks were shut down. Unfortunately, the only source for identifying the attack seems to be a single source - so, in other words, beware what you hear about it. There's also no guarantee all files will be restored. Certainly, organizations that can keep their software updated should do so.
Still, "My answer is, never pay the ransom", Abrams said.
An illustration showed that once you receive an infected file typically attached to an email or a URL, an encryption key locks all your data.