WannaCry in Review
WannaCry affected over 200,000 computers in 150 countries, but now what?
Why is WannCry Such a Puzzle?
- While the ransomware was very effective in the time that it was active, its own design quickly led to its failure. A piece of code that was intended to keep it from being detected was the very thing that a 22 year old British security researcher used to unwittingly stop it in its tracks. You can read his far more technical explanation here. Overall, the design of the ransomware itself was surprisingly amateur.
- The attackers did not set up hotlines to persuade victims to pay the ransom. And as far as researchers can tell, there were only three bitcoin wallets set up and no one has emptied the minimal sum of $50,000 from the wallets paid as of May 16, according to Business Insider. They were not prepared to handle bitcoin payments based upon such a wide distribution.
- Researchers understand that once one computer was infected in each network, the ransomware used a vulnerability in outdated Microsoft Windows that allows the ransomware “worm” to spread from one device to another very rapidly. However, what they are having a hard time finding is the source in each system. A few emails with the ransomware have been found, but it is clear that it did not take many to spread the worm worldwide with very little assistance from users. Without being able to tell how it started, it makes it much harder to stop similar future attacks.
How do we stop another attack?
Stopping another attack of this magnitude could be very difficult in the future because it does not appear to rely on users doing much of anything to spread like wildfire. Microsoft has called this a wake-up call for Windows users around the world and we agree 100%! While this particular version of ransomware was poorly designed, it is only a matter of time before a smarter, more sophisticated cyber criminal utilizes the same technique with better success. We cannot continue to ignore the need to proactively protect our network environments.
So while it becomes harder and harder to trace and stop the attacks themselves, there are plenty of tools and services out there that you can take advantage of to protect your computers and networks. We call this a layered security approach and it is how we protect our clients from attacks on a daily basis. For example, one layer is keeping up to date on the latest version of Windows. Our team makes sure your computers are updating on a regular basis. Another layer is Sonicwall’s active next-generation firewall security services, which basically means a very smart firewall that adapts to the latest threats. You can read here about how Sonicwall was preparing for such an attack as this since April 2017 and responded quickly on May 12, 2017 with additional support.
How do I protect my business?
- Start thinking about cyber security like you think about locking your car and your house. You don’t leave them unlocked, why would you leave your data unprotected?
- Make it a habit to keep your computer updated.
- Stop and think before you click a link in an email.
- Click here to download our Cyber Security Tips and Tricks
Give us a call today 1-888-330-8808 to get additional layers of security to protect your environment!
Our SECaaS program is only the first of our five cyber security services. Even more security, custom fitted to your company’s needs? How could you NOT want to learn more about our cyber security services? Don’t worry — we’ll tell you everything you want to know!
Was this article helpful?
For more information about how Domain Computer Services can benefit you.
The complexity and sophistication of ransomware attacks continue to rise.We've seen a dramatic increase in people reaching out to us in the last few weeks because of attacks that their current IT Service Provider couldn’t handle. But even more dangerously, we’re...
We are excited to announce Domain Computer Services ranked in the top 5 on the 2019 NJBIZ list of Top Cybersecurity Firms in New Jersey.
Do you really need a Penetration Test? The short answer is no. Well first off, what is a penetration test anyway? You might’ve heard that this is the best way to detect any vulnerabilities that you may have, but actually, that’s not the case. Let’s dive into some of the downsides of doing a pen test.