WannaCry Ransomware Attack is One of the Biggest

WannaCrypt Ransomware

Computers around the world are infected. What happened?

On Friday, May 12, 2017, a massive cyberattack called WannaCry took place globally, affecting millions of computers, thousands of companies and agencies, and catching most of the world totally off guard. This brand of hack falls under the category of ransomware, which you can learn more about here.

Whereas some hackers want to break into networks and computers, do their damage and then walk away quietly, ransomware is just the opposite. The hackers make it a point to tell you they’re in your network or computer. And they demand money.

A global hack attack!

More than 150 countries were affected, including China, Great Britain, Russia, the United States and the Middle East. Millions of computers were being held for ransom at the same time. The ransomware attacked computers belonging to businesses, governments, and institutions such as hospitals, schools, transportation companies and police stations.

The WannaCry ransom message is straightforward: pay the hackers a specific amount of money or you’re going to lose important files and documents on your computer. Using ransomware (a type of software virus), hackers freeze the files in computers system, denying the user access to those files until a ransom is paid. However, there’s no guarantee the hackers will keep their word.

Here are answers to basic questions about the WannaCry Ransomware attack.

How did the malware get on all those computers?

The WannaCry malware was launched globally and affected computers that were using a version of the Windows operating system that had a vulnerability to viruses. Microsoft Corp. had made a patch (or fix) available for users a few months ago, but millions of computers worldwide had not been updated with the correction or their owners were unaware of the issue. The hackers exploited the flaw.

Could the WannaCry ransomware affect my computer?

If you haven’t seen it yet, then it’s not likely. There could be future waves of WannaCry or a similar version of it. Also, it seems WannaCry was directed at mostly larger organizations. However, you could be affected by another strain of ransomware at any time.

How widespread was it?

The reach was indeed global. More than 150 countries were affected, including China, Great Britain, Russia, the United States and the Middle East. Millions of computers were being held for ransom at or around the same time. The official media for China reported that more than 29,000 “institutions” had been affected and hundreds of thousands of Internet-connected devices. In Japan, 600 different locations and 2,000 computers were hit. Hospitals in Jakarta, Indonesia had their patient files held for ransom, causing serious delays. The impact was greater in Europe and Asia than the West.

How did people discover their computer was infected?

When victims opened their computers (and if it was infected) they saw a frightening screen message that said “Oops, your files have been encrypted!” The screen message showed how much time they had in order to pay up, the amount of the ransom (to have access to the files again), and instructions on how to pay the ransom demand.

Who did it?

Nobody knows with certainty who did it. A handful of days after the attack, law enforcement agencies and coalitions from around the world had not identified the culprit or culprits and they hadn’t come forward to claim responsibility. That’s why online cyberterror and crime is so dangerous: hackers—many who are sophisticated network/technical experts—can attack and stay hidden in the shadows of the Internet.

How long did the attack last?

Thankfully, not very long. Here’s why: A few days after the attack, a security researcher with a private company noticed a strong similarity between the WannaCry malicious code and malware created and used once before by a well-known hacking operation, called Lazarus, which has links to North Korea. Information is changing quickly as more details become known daily. It’s ironic that as ransomware spreads, so do does the investigation

Did people pay the ransom demands?

It doesn’t seem that the WannaCry hackers made a lot of money, if that was their primary intention, although the facts aren’t known. According to news reports, a very small number of companies and computer-users affected (and there were millions!) paid the demands. Police agencies advise victims not to pay ransomware demands.

How much were the hackers asking for?

Reports indicate the ransom message was asking individual computer users for $300 right away, then upping the ransom demand to $600 just hours before the files were to be deleted. If that seems “small” in price, remember that millions of users were being attacked and millions of computers were being held ransom at one time by the same ransomware! The victims were supposed to send the ransom using Bitcoin, a digital, Internet-based currency.

What were some of the companies that were attacked?

Same very well know companies and organizations from around the world were victims of the WannaCry attack. In the Unites States, FedEx delivery company reported they were experiencing interference with some of their Windows-based systems caused by malware,” but they didn’t reveal the impact. In the UK, many hospitals hit by WannaCry had to cancel appointments and operations. Doctors reported not being able to send important emails about patients. Car manufacturers, Renault (France) and Nissan (Japan), both reported attacks. Germany’s biggest train system was hit and Russian banks were also attacked.

Was the WannaCry attack stopped?

Yes, and no. According to news reports, a researcher who works for a private security firm in the U.K. did some online detective work and was able to find an online solution. He triggered a “kill switch” that turned the malware off. (In a way, he found a flaw in the malware.) His actions helped stop the spread the virus, but it didn’t do any “decrypting” of the already infected computers. Despite his actions, security experts think the perpetrators could still release another strain of the ransomware virus that doesn’t have the kill switch.

Is there anything we can do to protect ourselves from WannaCry?

Most computers infected were connected to networks that had a vulnerability in their Microsoft operating systems. If you’re connected to such a network (at work, for example), there’s little you can do on your own to protect yourself.

In general, however, you can avoid ransomware by making sure you’re using the most updated version of your Windows operating system; that you’ve installed all “patches” or corrections Microsoft has sent on your version of Windows; that you immediately install patches when you get them; and that you have a good antivirus program that can alert you to a problem.

Sources: Los Angeles Times, Editorial/Opinion, May 16, 2017; Wall Street Journal, May 15, 16 editions.
CBC/Radio-Canada, www.cbc.ca/news/technology, May 15, 2017.

Picture of <span>About The Author</span>Chris Parker

About The AuthorChris Parker

Chris Parker is the founder of WhatIsMyIPAddress.com, one of the world’s most popular websites for online privacy and security with over 13 million monthly visitors. He is also the host of the Easy Prey podcast, where he interviews experts and survivors to uncover the tactics behind scams, fraud, and digital manipulation. Chris is the author of Privacy Crisis: How to Maintain Your Privacy Without Becoming a Hermit, a practical guide to protecting personal information in today’s surveillance-driven world. His work has been featured on ABC News and numerous podcasts, making him a trusted voice on how to stay safe, secure, and private online.
Share Post:

INSIGHTS YOU

MAY ALSO LIKE

You play a role in preventing social engineering. So, just what is social engineering? It’s a vague term that’s used for online shenanigans and…

If you think that only your Internet Service Provider (ISP), such as Cox Cable or Verizon, knows your IP address, think again. (Your IP…

This post was moved over from an old blog of mine that I’ve since taken down. Several years ago I purchased an APC AP9630…

WHAT PEOPLE SAY

ABOUT CHRIS

DOWNLOAD CHRIS’ BOOK

PRIVACY CRISIS

DOWNLOAD YOUR FREE PDF, MP3, and workbook by entering your details below.

We respect your privacy. 

Don’t want to share your email?

Privacy Policy

This following document sets forth the Privacy Policy for this website.

Collection of your personal information

We collect Non-Personally Identifiable Information from visitors to this Website. Non-Personally Identifiable Information is information that cannot by itself be used to identify a particular person or entity, and may include your IP host address, pages viewed, browser type, Internet browsing and usage habits, advertisements that you click on, Internet Service Provider, domain name, the time/date of your visit to this Website, the referring URL and your computer’s operating system.

Free offers & opt-ins

Participation in providing your email address in return for an offer from this site is completely voluntary and the user therefore has a choice whether or not to disclose your information. You may unsubscribe at any time so that you will not receive future emails.

Sharing of your personal information

Your personal information that we collect as a result of you purchasing our products & services, will NOT be shared with any third party, nor will it be used for unsolicited email marketing or spam. We may send you occasional marketing material in relation to our design services.

What Information Do We Collect?

If you choose to correspond with us through email, we may retain the content of your email messages together with your email address and our responses.

Cookie Based Marketing

Some of our advertising campaigns may track users across different websites for the purpose of displaying advertising. We do not know which specific website are used in these campaigns, but you should assume tracking occurs, and if this is an issue you should turn-off third party cookies in your web browser.

How Do We Use Information We Collect from Cookies?

As you visit and browse Our Website, the Our Website uses cookies to differentiate you from other users. In some cases, we also use cookies to prevent you from having to log in more than is necessary for security. Cookies, in conjunction with our web server log files or pixels, allow us to calculate the aggregate number of people visiting Our Website and which parts of the site are most popular.

This helps us gather feedback to constantly improve Our Website and better serve our clients. Cookies and pixels do not allow us to gather any personal information about you and we do not intentionally store any personal information that your browser provided to us in your cookies.

IP Addresses

P addresses are used by your computer every time you are connected to the Internet. Your IP address is a number that is used by computers on the network to identify your computer. IP addresses are automatically collected by our web server as part of demographic and profile data known as traffic data so that data (such as the Web pages you request) can be sent to you.

Sharing and Selling Information

We do not share, sell, lend or lease any of the information that uniquely identify a subscriber (such as email addresses or personal details) with anyone except to the extent it is necessary to process transactions or provide Services that you have requested.

How Can You Access and Correct Your Information?

You may request access to all your personally identifiable information that we collect online and maintain in our database by using our contact page form.

Changes to this Privacy Policy

We reserve the right to make amendments to this Privacy Policy at any time. If you have objections to the Privacy Policy, you should not access or use this website. You may contact us at any time with regards to this privacy policy.