Generated by DeepSeek V3.2| WannaCry | |
|---|---|
| Name | WannaCry |
| Type | Ransomware |
| Author | Lazarus Group |
| Operating system | Microsoft Windows |
| Isolation date | May 12, 2017 |
WannaCry. It was a worldwide cyberattack involving ransomware that began on May 12, 2017, targeting computers running the Microsoft Windows operating system. The attack encrypted data and demanded Bitcoin payments, causing widespread disruption across numerous sectors. Its rapid propagation was enabled by the exploitation of a vulnerability in Microsoft's implementation of the Server Message Block protocol.
The WannaCry ransomware attack represented a significant escalation in global cybercrime, leveraging a weaponized exploit allegedly developed by the National Security Agency. The attack indiscriminately affected hundreds of thousands of systems in over 150 countries, including critical infrastructure like the National Health Service in the United Kingdom and Telefónica in Spain. Its design combined a self-propagating worm component with a ransomware payload, creating a uniquely virulent threat. The incident highlighted severe vulnerabilities in organizational cybersecurity practices and the dangers of stockpiled zero-day exploits.
The malware exploited a critical vulnerability in the Server Message Block protocol version 1, known as EternalBlue. This exploit, which targeted a buffer overflow in the protocol's handling of compressed data packets, was part of a trove of tools leaked by the Shadow Brokers hacker group. Upon infection, WannaCry would encrypt files with extensions such as .doc and .jpg using a combination of RSA and AES encryption algorithms. A "kill switch," discovered by security researcher Marcus Hutchins, involved a specific unregistered domain name; connecting to this domain halted the malware's spread.
The disruption was immediate and severe, particularly within the National Health Service in England and Scotland, where appointments were canceled and emergency rooms turned away non-critical cases. Major corporations like Renault halted production at several plants, while logistics giant FedEx reported significant system damage. In Asia, institutions like Hitachi and Nissan Motor Company were affected, and in Russia, the Ministry of Internal Affairs and Russian Railways reported infections. Estimates suggest the attack infected more than 200,000 computers globally, with total damages ranging into the billions of United States dollar.
The global response was swift, with Microsoft taking the unusual step of releasing security patches for outdated systems like Windows XP and Windows Server 2003. The activation of the kill switch by Marcus Hutchins of Kryptos Logic dramatically slowed the worm's propagation. Organizations like the National Cyber Security Centre in the UK and Europol's European Cybercrime Centre coordinated international efforts to contain the outbreak. The event spurred widespread advocacy for improved patch management and increased investment in network security across both public and private sectors.
Multiple governments and private security firms, including Symantec and Kaspersky Lab, attributed the attack to the Lazarus Group, a cybercrime organization linked to the Democratic People's Republic of Korea. In December 2017, the White House publicly blamed the North Korean government for the attack. While no charges were filed directly for WannaCry, the U.S. Department of Justice later indicted Park Jin-hyok, an alleged member of the Lazarus Group, for other cyber operations. The United Nations Security Council has discussed imposing further sanctions on North Korea in response to its cyberwarfare activities.
Category:Ransomware Category:Cyberattacks Category:2017 in computing