Skip to main content

Massive worldwide ransomware attack hits more than 200,000 victims, and climbing

New WannaCry ransomware tool Wanakiwi can save more people's data

Close-up of hands on a laptop keyboard in a dark room.
Dmitry Tishchenko/123RF
On Friday, May 12, 2017, cybersecurity firm Avast reported on a massive ransomware attack that hit more than 75,000 victims in 99 countries and that had risen to over 126,000 in 104 countries by Saturday afternoon. While most of the targets were located in Russia, Ukraine, and Taiwan, other victims have been identified in Europe.

Most notably, Spanish telecommunications company Telefonica was a victim, as were hospitals across the United Kingdom. According to The Guardian, the U.K. attacks hit at least 16 National Health System (NHS) facilities and directly compromised the information technology (IT) systems that are used to ensure patient safety.

Avast
Avast

The WanaCryptOR, or WCry, ransomware is based on a vulnerability that was identified in the Windows Server Message Block protocol and was patched in Microsoft’s March 2017 Patch Tuesday security updates, reports Kaspersky Labs. The first version of WCry was identified in February and has since been translated into 28 different languages.

Microsoft has responded to the attack with its own Windows Security blog post, where it reinforced the message that currently supported Windows PCs running the latest security patches are safe from the malware. In addition, Windows Defenders had already been updated to provide real-time protection.

“On May 12, 2017 we detected a new ransomware that spreads like a worm by leveraging vulnerabilities that have been previously fixed,” Microsoft’s summary of the attack began. “While security updates are automatically applied in most computers, some users and enterprises may delay deployment of patches. Unfortunately, the malware, known as WannaCrypt, appears to have affected computers that have not applied the patch for these vulnerabilities. While the attack is unfolding, we remind users to install MS17-010 if they have not already done so.”

The statement continued: “Microsoft antimalware telemetry immediately picked up signs of this campaign. Our expert systems gave us visibility and context into this new attack as it happened, allowing Windows Defender Antivirus to deliver real-time defense. Through automated analysis, machine learning, and predictive modeling, we were able to rapidly protect against this malware.”

Avast further speculated that the underlying exploit was stolen from the Equation Group, which has been suspected of being tied to the NSA, by a hacker group calling themselves ShadowBrokers. The exploit is known as ETERNALBLUE and named MS17-010 by Microsoft.

When the malware strikes, it changes the name of affected files to include a “.WNCRY” extension and adds a “WANACRY!” marker at the beginning of each file. It also places its ransom note into a text file on the victim’s machine:

Avast
Avast

Then, the ransomware displays its ransom message that demands between $300 and $600 in bitcoin currency and provides instructions on how to pay and then recover the encrypted files. The language in the ransom instructions is curiously casual and seems similar to what one might read in an offer to purchase a product online. In fact, users have three days to pay before the ransom is doubled and seven days to pay before the files will no longer be recoverable.

Avast
Avast

Interestingly, the attack was slowed or potentially halted by an “accidental hero” simply by registering a web domain that was hard-coded into the ransomware code. If that domain responded to a request from the malware, then it would stop infecting new systems — acting as a sort of “kill switch” that they cybercriminal could use to shut off the attack.

As The Guardian points out, researcher, known only as MalwareTech, registered the domain for $10.69 was unaware at the time of the kill switch, saying, “I was out having lunch with a friend and got back about 3 p.m. and saw an influx of news articles about the NHS and various UK organisations being hit. I had a bit of a look into that and then I found a sample of the malware behind it, and saw that it was connecting out to a specific domain, which was not registered. So I picked it up not knowing what it did at the time.”

MalwareTech registered the domain on behalf of his company, which tracks botnets, and at first, they were accused of initiating the attack. “Initially someone had reported the wrong way round that we had caused the infection by registering the domain, so I had a mini freakout until I realized it was actually the other way around and we had stopped it,” MalwareTech told The Guardian.

That likely won’t be the end of the attack, however, as the attackers might be able to alter the code to omit the kill switch. The only real fix is to make sure that machines are fully patched and are running the right malware protection software. While Windows machines are the targets of this particular attack, MacOS has demonstrated its own vulnerability and so users of Apple’s OS should make sure to take the appropriate steps as well.

In much brighter news, it now appears that there is a new tool that can determine the encryption key used by the ransomware on some machines allow users to recover their data. The new tool, called Wanakiwi, is similar to another tool, Wannakey, but it offers a simpler interface and can potentially fix machines running more versions of Windows. As Ars Technica reports, Wanakiwi uses some tricks to recover the prime numbers used in creating the encryption key, basically by pulling those numbers from RAM if the infected machine remains turned on and the data has not already been overwritten. Wanawiki leverages some “shortcomings” in the Microsoft Cryptographic application programming interface that was used by WannaCry and various other applications to create encryption keys.

According to Benjamin Delpy, who helped develop Wanakiwi, the tool was tested against a number of machines with encrypted hard drives and it was successful in decryption several of them. Windows Server 2003 and Windows 7 were among the versions tested, and Delpy assumes Wanakiwi will work with other versions as well. As Delpy puts it, users can “just download Wanakiwi, and if the key can be constructed again, it extracts it, reconstructs it (a good one), and starts decryption of all files on the disk. In bonus, the key I obtain can be used with the malware decryptor to make it decrypt files like if you paid.”

The downside is that neither Wanakiwi nor Wannakey works if the infected PC has been restarted or if the memory space holding the prime numbers has already been overwritten. So it is definitely a tool that should be downloaded and held at the ready. For some added peace of mind, it should be noted that security firm Comae Technologies assisted with developing and testing Wanakiwi and can verify its effectiveness.

You can download Wanakiwi here. Just decompress the application and run it, and note that Windows 10 will complain that the application is an unknown program and you will need to hit “More info” to allow it to run.

Mark Coppock/Digital Trends
Mark Coppock/Digital Trends

Ransomware is one of the worst kinds of malware, in that it attacks our information and locks it away behind strong encryption unless we pay money to the attacker in return for a key to unlock it. There is something personal about ransomware that makes it different from random malware attacks that turn our PCs into faceless bots.

The single best way to protect against WCry is to make sure that your Windows PC is fully patched with the latest updates. If you have been following Microsoft’s Patch Tuesday schedule and running at least Windows Defender, then your machines should already be protected — although having an offline backup of your most important files that can’t be touched by such an attack is an important step to take. Going forward, it is the thousands of machine that have not yet been patched that will continue to suffer from this particular widespread attack.

Updated on 5-19-2017 by Mark Coppock: Added information on Wanakiwi tool.

Editors' Recommendations

Mark Coppock
Mark has been a geek since MS-DOS gave way to Windows and the PalmPilot was a thing. He’s translated his love for…
Best Salesforce alternatives 2023: 7 other CRM tools worth trying
A customer relationship management diagram.

In the realm of sales management, finding the right customer relationship management software (or CRM) is crucial for streamlining your sales funnel, nurturing customer relationships, and boosting your conversion rate. While Salesforce has long been a dominant player in the CRM market, there are a number of compelling alternatives that offer comparable functionalities and features.

This roundup explores seven powerful Salesforce alternatives, analyzing their unique strengths, customizable interfaces, and integration capabilities. Whether you're a small startup, a growing medium-sized business, or an established enterprise, these CRM systems provide diverse solutions to your specific sales management needs. From advanced AI-driven lead prioritization to intuitive visual pipelines, each alternative offers its own benefits that can transform how you approach sales. Ready to level up your sales game? Let's dive in:
Freshsales

Read more
Squarespace Courses: Empowering the next-generation of creative entrepreneurs
Squarespace Courses will allow entrepreneurs to create online learning solutions

This content was produced in partnership with Squarespace.
It's been clear from the very start that Squarespace was building and planning something truly special. If you don't already know, you can build professional-quality and beautiful websites through the platform with a remarkably easy tool set. You don't need any knowledge of web design or programming to get started, and you can have a site up in minutes. But thanks to how convenient it all is, it's become something of a go-to platform for digital and online creation. Now, Squarespace is elevating its all-in-one platform even more, offering something new to the next generation of entrepreneurs and creatives, who want to build their brands and monetize their audience. It's called Squarespace Courses, and like its website builder, the tool will allow customers to design and sell beautiful, multimedia courses to their customers.

Course designers will be able to create expansive programs across sequential lessons, using videos, and chapters, all while also offering progress tracking. As is customary for online courses, entrepreneurs can then create an overview of each course, set the prices for admission, and then allow potential students to preview content before making a purchase. Launching August 21st, 2023 this feature is simply not available through other easy-website-building platforms -- it's exclusive to Squarespace.

Read more
Semrush Free Trial: Try the advanced online marketing tool
how to clean up your keywords and refresh seo strategy semrush logo feature image large

Marketing will make or break your new venture. A lot more goes into running a traditional or ecommerce business than just registering a new domain, making a website -- even with a Wix free trial -- and calling it a day. Potential customers must be made aware that your business exists, and for that to happen in the digital age, you need to make use of modern online marketing tools. That's a broad field, though, encompassing keyword research, search engine optimization, data analytics, and other elements that can be pretty technical (not to mention intimidating) to the uninitiated. Enter Semrush, one of the best online marketing suites that makes all that stuff easy -- but it's not free. Maybe you want to give it a try before signing up for a premium subscription? If that's the case and you are looking for a Semrush free trial, then you're in luck. Read on. We have all the details for you, below.

Is there a Semrush free trial?

Read more