Case Study: The WannaCry Ransomware

WannaCry is a ransomware that was intially deployed on May 12th 2017. WannaCry uses a combination of the EternalBlue and DoublePulsar expolits, both developed by the United States National Security Agency (NSA). The exploits were allegedly developed for use by the NSA to infiltrate systems running older Versions of Windows. It is only able to infect hosts running particular versions of Windows, primarily Windows 7.

Both exploits were publicly released several months before WannaCry was deployed, by the famous hacker group "The Shadow Brokers". It is likely that the exploits were stolen from the NSA and subsequently leaked to the public. Upon infecting a Windows host, WannaCry would first check whether it could connect to a specific harccoded domain. If this was not possible, the randsomware would start encrypting the files of the host. Once this was complete, it would prompt the user with a red information box describing the current file situation of the host. It would then explain that the user had the option of paying a 300 USD ransom in the form of Bitcoin to unlock their files. A timer would also be started that would indicate how much time the user had before the ransom fee doubled.

wannacry


Timeline of the Attack


The initial attack started on Friday the 12th of May. The worm started spreading from Asia and before the end of the day was able to infect more than 200,000 computers worldwide. Among the most notable targets was the British National Health Service, FedEx, O2, Taiwan SemiConductor and MegaFon. All targets were severly impaired, rendering their IT infrastructure unusable. In particualr the NHS was forced to close emergency rooms and limit patient care due their whole network being down. The degree of damage and speed with which it was caused remains among the greatest of any cyber attack.


All virus victims were running older unpatched versions of Windows. Microsoft released a security patch on the same day. Although this helped patch the exploited vulnerability on uninfected hosts it was of no help to ones already infected. Despite its quick spread the initial outbreak was stopped by secuirty researcher Marcus Hutchins.


This was entirely due to him finding a domain associated kill-switch in the intial variant. Because at first WannaCry pinged www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com a domain that did not exist, it would automatically encrypt the users files. When Hutchins registered the domain, the virus automatically stopped spreading. This worked for some time until the domain was targeted by Mirai botnet, with the hopes of taking it down and allowing WannaCry to continue operating. 2 days later the first variant appeared. This variant also employed the same kill-switch method albeit with a different domain. However the continued useage of this same kill-switch mechanism effectively rendered subsequent versions easier to deal with. Within a week researchers were able to develop tools to decrypt the files encrypted by WannaCry and remove it. This effectively stopped its rapid spread. However, it continues to morph and newer versions have since appeared. Looking at the 3 bitcoin wallets associated to the original variant it appears that some people continue to pay the ransom.