A computer screen cyberattack warning notice reportedly holding computer files to ransom, as part of a massive international cyberattack, at an office in Kiev, Ukraine, Tuesday June 27, 2017. Oleg Reshetnyak AP
">

A global law firm with headquarters in London, DLA Piper, reported extensive problems. A sign outside its offices in Washington told employees upon entering: “Please remove all laptops from docking stations & keep turned off. *No exceptions*”

One cyber expert said the latest attack may be a harbinger of greater disruption ahead.

“The sophistication and consequences of ransomware attacks have reached a new level. The days are near where a cyber-attack can result in a total blackout and affect the lifeblood of society,” said Matthias Maier, security expert at Splunk, a San Francisco software company.

The spread of the ransomware unfolded at alarming speed. One security researcher, Dave Kennedy of TrustedSec, a Strongsville, Ohio, firm, tweeted that Petya “spreads SUPER fast,” adding that he observed the ransomware hit 5,000 networks “in under 10 minutes.”

Like the perpetrators of the May 12 WannaCry attack, those behind the Petya attack raised little money from the mayhem they were causing. By late afternoon, they’d received 31 payments of bitcoin with a value of about $8,050.

“That’s one of the headscratchers of this. If it’s done for criminal means, you’d think they be better criminals,” said Beau Woods, deputy director of the Cyber Statecraft Initiative at the Atlantic Council, a think tank. “It could be that they are just really bad at creating malicious software or setting up criminal enterprises.”

The WannaCry ransomware epidemic utilized one of a handful of powerful cyber tools stolen from the NSA and leaked to the public in March by an underground group, The Shadow Brokers. The group contends it has many more tools that it will auction off to bidders. Some experts say a North Korean hacking unit launched the WannaCry epidemic, which they said hit 10 to 15 million computers worldwide.

The NSA has never confirmed the breach.

Jonathan Pollet, founder of a Houston area industrial cybersecurity firm, Red Tiger Security, said that a decade ago malware was usually constructed for a single purpose. But today, malicious code is more sophisticated and comprises tool sets that “are almost like lego bricks” and have multiple purposes. The NSA EternalBlue tool is just one component, he said.

For those angry that a government-created tool might fall into criminal hands and point back at the country of its creators, Pollet said there is little to be done.

“You can’t sue a federal agency,” Pollet said. “There’s no recourse for this.”

Tim Johnson: 202-383-6028, @timjohnson4