A screengrab from a website of Britain's National Health Service explaining the impact of a massive computer hack that affected computers in 74 countries Friday. East and North Hertfordshire NHS AP
">

The wave of attacks largely sidestepped the United States, and the reason wasn’t entirely clear. But the attacks grabbed the attention of U.S. legislators and cyber researchers alike.

“We’ll likely look back at this as a watershed moment,” said Sen. Ben Sasse, a Nebraska Republican who is a member of the Senate Armed Services Committee. He said the attacks on Britain’s health system had left physicians and nurses “scrambling to treat patients without their digital records or prescription dosages.”

U.S. computers networks may face their day soon, said cyber experts.

“There is cause for alarm in the U.S. as well, given the speed at which this attack has spread and the fact that it seems to know no border,” said Mounir Hahad, senior director at Cyphort Labs in California’s Silicon Valley.

Another cyber expert said cyber criminals were learning to amplify their reach.

“With WannaCrypt leveraging EternalBlue, ransomware has taken on a new form of automation. The author only has to infect one computer on the network. Once that device is infected, the ransomware will worm across the network compromising other computers,” said researcher Daniel Smith of Radware, a cybersecurity services firm based in Tel Aviv, Israel.

Others saw the attack on the 16 hospitals and clinics of Britain’s National Health Service as a harbinger of attacks on specific sectors of economic activity.

“The NHS hospital attack is an indicator for a new evolution of malware that will focus on critical systems such as airlines and hospitals where paying ransoms may be the only way to resume business operations in some case of life or death,” said Paul Calatayud, chief technology officer at FireMon, an Overland Park, Kansas, cybersecurity firm.

Others worried that U.S. intelligence agencies can give criminal groups powerful new ways to refine their techniques by failing to safeguard their cyber arsenals or failing to alert software makers quickly when vulnerabilities are discovered.

Federal agencies like the NSA develop their own tools to hack systems but also buy them from malware vendors. The U.S. government and other nations are believed to stockpile certain security vulnerabilities, declining to disclose them to software developers so they can continue to exploit them.

That has provoked tension with some high-tech companies, and it led in early 2016 to the release of a framework known as the Vulnerabilities Equity Process, as a way to determine when and whether the government should disclose software flaws.

Tim Johnson: 202-383-6028, @timjohnson4