Ransomware WannaCry

 





Introduction

The WannaCry Ransomware attacked worldwide in May, 2017. It used the WannaCry ransomware cryptoworm, and targeted the computers running on the Microsoft Windows Operating System. It encrypted the data and demanded ransom payments in the Bitcoin cryptocurrency. It exploited EternalBlue. developed by the United States National Security Agency, which was stolen and leaked by The Shadow Brokers one month before the attack occurred. 

Countries like the U.S.A. and U.K. formally confirmed that the attack was originated from North Korea. However, North Korea denied any involvement in the attack. It is estimated that the attack affected more than 300,000 computers of about 150 countries. 

Characteristics

The WannaCry Ransomware cryptoworm is also known as WannaCrypt, Wanna Decrypt0r 2.0, and Wanna Decryptor. It is a network worm laced with a transport mechanism to automatically spread itself. The transport code scans the vulnerable systems and gain access using the EternalBlue exploit. After that the DoublePulsar backdoor tool is used to install and execute a copy of the ransomware. 

When the execution is done successfully, this malware checks the kill switch domain name before anything, and if it is not there then the ransomware starts encrypting the data. It also try to exploit the SMB vulnerability spreading itself to the other computers via internet and laterally to the computers present on the same network. 

 Impact

Kaspersky Lab asserted that the countries like India, Russia, Ukraine, and Taiwan were the most affected countries among the others. The other organizations targeted by this ransomware were the National Health Service Hospitals of England and Scotland, Nissan Motor Manufacturing in UK, Spain's Telefonica, FedEx, and Deutsche Bahn, etc. 

However, the attack done by WannaCry was relatively less as compared to the other potential attacks of same types. It should be noted that its attacks might be much worse if Hutchins had not discovered the in-built kill switch created by its creators, or if it targeted much critical infrastructures like the railways, Nuclear power plants, dams, etc. 

Conclusion

WannaCry ransomware had targeted many organizations, that have been identified publicly. Hence, the information available about their pattern and everything is sufficient enough to successfully protect a network from its attack and/or mitigate its adverse effects. 





















































Comments

Popular posts from this blog

Deployment (Part 3)

Deployment (Part 1)

Project Resourcing (Part 2)