Organizations in dozens of countries have all been hit with the same 
ransomware program, a variant of "WannaCrypt," spouting the same ransom 
note and demanding $300 for the encryption key, with the demand 
escalating as time passes.
What has happened?
On May 12, 2017 a new variant of the Ransom.CryptXXX family (Detected as Ransom.Wannacry) of ransomware began spreading widely impacting a large number of organizations, particularly in Europe.
England's healthcare system came under a withering cyberattack Friday morning, with "at least 25"
 hospitals across the country falling prey to ransomware that locked 
doctors and employees out of critical systems and networks. It's now 
clear that this is not a (relatively) isolated attack but rather a 
single front in a massive digital assault.
A few hours ago, Spain’s Computer Emergency Response Team CCN-CERT, posted an alert
 on their site about a massive ransomware attack affecting several 
Spanish organizations. The alert recommends the installation of updates 
in the Microsoft March 2017 Security Bulletin as a means of stopping the spread of the attack.
So now as we have seen what has really happened in past few days, let us see the complete details of this ransomware and steps we should perform to protect ourselves from this attack.
What is WannaCry?
WannaCry encrypts data files and ask users to pay a US$300 ransom in 
bitcoins. The ransom note indicates that the payment amount will be 
doubled after three days. If payment is not made after seven days, the 
encrypted files will be deleted.
|  | 
| Click to view full size image | 
 It also drops a file named !Please Read Me!.txt which contains the ransom note.
|  | 
| Click to view full size image | 
The tool was designed to address users of multiple countries, with translated messages in different languages.
|  | 
| Click to view full size image | 
Note that the “payment will be raised” after a specific countdown, 
along with another display raising urgency to pay up, threatening that 
the user will completely lose their files after the set timeout. Not all
 ransomware provides this timer countdown.
To make sure that the user doesn’t miss the warning, the tool changes
 the user’s wallpaper with instructions on how to find the decryptor 
tool dropped by the malware.
|  | 
| Click to view full size image | 
For command and control, the malware extracts and uses Tor service 
executable with all necessary dependencies to access the Tor network. Hence, the IP address is hard to trace. Also, the malware is not spread through a single PC. Instead, they attackers used botnets to spread it and that makes it hard to be traced back.
The file extensions that the malware is targeting contain certain clusters of formats including:
- Commonly used office file extensions (.ppt, .doc, .docx, .xlsx, .sxi).
- Less common and nation-specific office formats (.sxw, .odt, .hwp).
- Archives, media files (.zip, .rar, .tar, .bz2, .mp4, .mkv)
- Emails and email databases (.eml, .msg, .ost, .pst, .edb).
- Database files (.sql, .accdb, .mdb, .dbf, .odb, .myd).
- Developers’ sourcecode and project files (.php, .java, .cpp, .pas, .asm).
- Encryption keys and certificates (.key, .pfx, .pem, .p12, .csr, .gpg, .aes).
- Graphic designers, artists and photographers files (.vsd, .odg, .raw, .nef, .svg, .psd).
- Virtual machine files (.vmx, .vmdk, .vdi).
WannaCry encrypts files with the following extensions, appending .WCRY to the end of the file name.
Countries infected with WannaCry
Currently, more than 45,000 attacks of the WannaCry 
ransomware in 74 countries around the world are recorded. Most of them happened in Russia.  It’s 
important to note that our visibility may be limited and incomplete and 
the range of targets and victims is likely much, much higher.
|  | 
| Click to view full size image | 
How does it work?
The infection vector appears to work through a known vulnerability, 
originally exploited as "ETERNALBLUE" and developed by the National 
Security Agency. That information was subsequently leaked by the hacking
 group known as The Shadow Brokers which has been dumping its cache of purloined NSA hacking tools onto the internet since last year.
The
 virus appears to have originally spread via email as compressed file 
attachment so, like last week's Google Docs issue, make sure you confirm
 that you email's attachments are legit before clicking on them. Once 
it's on one system, it can easily spread across private networks using a flaw in the Windows SMB Server. (To know more about Windows SMB Zero-day Attack, click here.)
Once a vulnerable PC becomes infected, the computer will attempt to spread to other machines over the local network as well as over the internet. The ransomware will specifically scan for unpatched machines that have the Server Message Block vulnerability exposed.
Once a vulnerable PC becomes infected, the computer will attempt to spread to other machines over the local network as well as over the internet. The ransomware will specifically scan for unpatched machines that have the Server Message Block vulnerability exposed.
Windows SMB Server flaw allows unauthorized remote access to PCs in the network, using the infected PCs as Botnets. Hence, this vulnerability is exploited and ransomware is spread.
Also,
 make sure your computers are using software that's still receiving 
security updates, and that you've installed the latest updates 
available. Microsoft released a fix for the exploit used as a part of its March "Patch Tuesday" release, but unpatched Windows systems remain vulnerable.
As this article is too long, I will post the steps to prevent yourself from this attack in my next article. So stay tunned..!
If you have any extra information that you would like to share, or if you want to make discussion on a topic, just post comments in the comment box provided below and I will surely help you out.!
Update: Wrote an article on how to prevent yourself from being encrypted via WannaCry Ransomware. To read the article, click here...!
Update: Wrote an article on how to prevent yourself from being encrypted via WannaCry Ransomware. To read the article, click here...!
 

 
 
 
 
 
 
 
 
 
 
 
0 comments:
Post a Comment
Thanks for reading this article.
Please comment your reviews..This will help us improve.