WannaCry Worm and The State of IoT Security

Authored byNikunj Pon Sep 18, 2017 in Topic Technology
Keyword Cloud

Subscribe to email updates

zymr-wannacry-worm-and-the-state-of-iot-security

The ransomware “WannaCry” worm has devastated the globe overnight when it utilized spam, deployed multiple infection methods, and even stole from leaked NSA exploits. Roughly 75,000 PCs were infected. But, what made the situation even worse was that the ransomware hit 48 NHS hospitals across Britain, seizing operations and causing panic amongst the medical community.

Fortunately, a researcher from the U.K. that goes by the name of MalwareTech saw an opportunity to temporarily halt the worm before it began to spread even further. Upon tracking where the source was coming from, MalwareTech saw a golden opportunity when he noticed one of the web domains that the attackers were using wasn’t registered. Immediately, the 22-year-old took control of the domain by purchasing it for $10. Upon buying it, he started noticing connections from the infected victims, and began devising a plan to halt the progress of the ransomware.

It doesn’t stop there. MalwareTech also took down the WannaCry operation – which wasn’t in his original plans. The attackers that designed the ransomware created a set of security tools that were disguised to fake Internet access from a variety of quarantined PCs. With a stroke of good luck, MalwareTech managed to halt the operation of the ransomware along with its safeguarded system designed to fool PCs into granting them access to the infection itself. According to MalwareTech he stated, “It was meant as an anti-sandbox measure that they didn’t quite think through.” Meaning, the malware essentially destroyed itself as a result of this ping.

Because of the danger of the ransomware, due to its ability to spread itself across a network, detection and protection must be prioritized with any PC. Many clients tend to utilize Norton and Symantec services to protect themselves against infections. Notably speaking, Norton and Symantec have proactively blocked the ransomware’s infection utilizing a combination of different methods – SEP14 Advanced Machine Learning and The Blue Coat Global Intelligence Network (GIN) are two examples.

Customers that have technologies such as: IPS network-based protection, Advanced Machine Learning, Intelligent Threat Cloud, and SONAR behavior detection technology should always ensure that they remain active for full protection. Failure to do so could result in one’s PC being thoroughly infected by the malware.

The ransomware WannaCry scopes out and encrypts a variety of different file types and appends. It then notifies the user to send a $300 ransom in Bitcoins along with a note detailing the prioritization of the payment. The note also dictates that the ransom will double in three days and the encrypted files will be deleted after seven. Symantec has run tests on the ransomware itself and did not discover any code that would allow the attacker to gain the ability to delete such files. Essentially the ransom is an empty threat that fools people into donating to thieves and cons. Do not pay the ransom and do not attempt to communicate with the note that has been left if you are infected by the malware. Be sure to backup important files on a separate hard drive beforehand to counter this.

This article was authored by Nikunj Patel, who is a Lead Software Engineer at Zymr.

Categories

0 comments

Leave a Reply

Contact Us

Request a Consultation

Please prove you are human by selecting the Tree.

Smartsourcing: A guide to selecting an Agile Development Partner

Smartsourcing is a brief guide to the world of modern technology partnerships. It was developed through a collaborative effort of top Zymr executives as we uncovered a gap in the market between the perception of what outsourcing used to be, and how leading technology innovators are leveraging this globalized approach to value generation. Read this guide to learn...

  • Key factors to consider for your development strategy
  • Popular destinations with a track record of high quality services
  • Selection criteria to narrow your shortlisted vendors

Get access to Smartsourcing eBook

 30 days 3 Months 1 year Still exploring

Register below to download your free eBook

Register below to download your free White Paper

Register below to download your free Guide

Register below to download your full Case Study

Please prove you are human by selecting the Cup.

Register below to download your Healthcare Cloud Stack

Register below to download your Microservices eBook