The first attack on our list is the WannaCry ransomware attack. This attack hit businesses and organisations all over the world in May of 2017. The WannaCry ransomware encrypted data on victimsā computers and demanded a ransom payment in order to decrypt the data. This attack affected more than 200,000 computers in 150 countries.
The WannaCry ransomware attack was particularly dangerous because it exploit a vulnerability in Microsoft Windows that had been previously unknown. This meant that many organisations were not prepared for this type of attack. The WannaCry ransomware also spread quickly, thanks to a feature that allowed it to spread itself from one computer to another.
While the WannaCry ransomware attack was devastating, it could have been much worse. Fortunately, a security researcher discovered a kill switch that stopped the spread of the malware. However, this did not stop the damage that had already been done.
How does a WannaCry attack work?
The cybercriminals responsible for the attack took advantage of a weakness in the Microsoft Windows operating system using a hack that was allegedly developed by the United States National Security Agency.
Known as EternalBlue, this hack was made public by a group of hackers called the Shadow Brokers before the WannaCry attack.
Microsoft released a security patch which protected userās systems against this exploit almost two months before the WannaCry ransomware attack began. Unfortunately, many individuals and organizations do not regularly update their operating systems and so were left exposed to the attack.
Those that had not run a Microsoft Windows update before the attack did not benefit from the patch and the vulnerability exploited by EternalBlue left them open to attack.
When it first happened, people assumed that the WannaCry ransomware attack had initially spread through a phishing campaign (a phishing campaign is where spam emails with infected links or attachments lure users to download malware). However, EternalBlue was the exploit that allowed WannaCry to propagate and spread, with DoublePulsar being the ābackdoorā installed on the compromised computers (used to execute WannaCry).
Comments
Post a Comment