The attack didn’t stop with the NHS, instead spreading to computers around the globe. Victims were confronted with a message on their machines declaring that their data had been encrypted, and could only be accessed if they forked out $300 (sent via bitcoin). The infection used a computer exploit, known as “ETERNALBLUE,” developed by the National Security Agency (NSA), and leaked online by hacking group The Shadow Brokers. Although, the hackers reportedly managed to extort more than $100,000 using the malware, it seems the NHS didn’t hand over a single penny. But, the overarching cost of the disruption may never come to light.

Still, the attack could have been prevented if the NHS had followed simple cybersecurity measures, suggested the NAO. It had repeatedly been warned to “migrate” away from old Windows XP software, which was susceptible to the hack. And, in March and April, NHS Digital issued more warnings to organizations to patch the bug in their systems that later allowed WannaCry to spread. A cybersecurity assessment was conducted on 88 out of 236 NHS organizations, and none had passed, said the NAO.

The WananCry virus was accidentally stopped by security researcher Marcus Hutchins using a domain-based kill switch. But, not before it affected a number of big-name companies, including FedEx, Renault, Telefonica, and even Germany’s railway system. Since then, two more ransomwares have sprung up: NotPetya started in Ukraine in June and quickly spread worldwide, and Bad Rabbit plagued parts of Europe and Russia earlier this week.