Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    WannaCry Ransomware Campaign Was Just the First Wave

    Written by

    Wayne Rash
    Published May 27, 2017
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      As malware attacks go, the WannaCry ransomware worm was only partly successful. By the time it was only a few days old, the attack was effectively blocked when an alert security researcher noticed that the worm was searching for a specific site on the internet.

      The researcher registered the site to take control of it which caused WannaCry infections to slow down and stop.

      But in other ways, WannaCry was very effective. First it demonstrated that a worm combined with ransomware will really work. In addition, it was able to raise around $100,000 before it was stopped.

      But in the world of cyber-crime, $100,000 isn’t a lot of money. This means that the perpetrators will want to build on their successes and create a new ransomware worm that avoids the pitfalls of WannaCry. This means that we can expect new attempts to crack seize control of computers, encrypt data and hold it for cash ransoms.

      “The ransomware payload wasn’t all that novel,” said Jack Danahy, CTO of Barkly Protects, a company that provides enterprise anti-malware defenses. “What they did used a new technique to spread itself using an exploit called Eternal Blue which was revealed by ShadowBrokers.”

      Danahy pointed out that the recommendation for defeating the WannaCry attack was simply to apply the patch released by Microsoft in March to close the vulnerability. He said that even if the malware writers removed the kill switch that ended the spread of WannaCry, a new version wouldn’t be particularly effective, because so many users will have patched their versions of Windows.

      “There were other exploits in that dump that the ShadowBrokers released,” Danahy said. He said that ShadowBrokers have now promised to release a new round of exploits each month. “If they release a wave of new ransomware every month, we may see a type of ransomware that’s propagated more broadly when it’s released.”

      Danahy said that such a monthly release schedule may effectively force the hands of IT departments to update their systems and apply patches more rigorously. He said that the amount of attention that WannaCry generated will also play a role in encouraging the malware writers to try new things. “It’s kind of the perfect crime,” Danahy said, “Profitable, simple and anonymous.”

      But Danahy thinks the nature of the ransomware may change so that more victims will actually pay up. He said that his company recently found in a survey that only about 5 percent of victims actually pay the ransom.

      This is partly because victims have learned to have backups in place so that they don’t need to pay the ransom, but also said that there’s a growing lack of trust among victims that cyber-criminals will decrypt their data even if they paying the ransom.

      “As people begin to have less trust, it’ll cause a fundamental business change,” he said.

      Danahy said that one method of forcing victims to pay the ransom is to threaten to publicly expose the encrypted data. For some organizations such as law firms, this could be significant. While there are ways to make it difficult or impossible to expose such data, not many organizations have the capability to accomplish that.

      For many organizations, the important question is now how to protect the data from the near-certain attacks that will use unpatched exploits. In this situation, it’s not enough to tell people not to click on email links, because the malware can be triggered simply by arriving on the victim’s computer.

      Adding to the complexity of dealing with these ransomware campaigns is the fact that the malware writers can use the released exploits to quickly reduce their costs and raise the effectiveness of their malware. “We’re going to see new exploits that reassert the virality of new ransomware campaigns,” Danahy said.

      While prompt and aggressive flaw patching can reduce the risks of getting hit by a ransomware attack, some businesses are now dealing with the shortsighted decisions they made years ago when they didn’t design custom software they developed to easily handle regular updates. Those shortcomings can be overcome in the future with better programming practices.

      But for now, potential victims (meaning nearly everyone) can protect themselves by good network hygiene and by making sure that they have backups that they know can be recovered.

      Good behavior-based anti-malware software such as Barkly or Malwarebytes can help reduce the risk. An anti-encryption product such as Cybereason, which can detect when ransomware is about to begin encrypting files and then stop it in its tracks can also prove critical.

      What we don’t know for sure is whether the next attack will be ransomware or something else. While WannaCry surely got a lot of public attention, it didn’t generate a lot of profits to cyber-criminals. It’s possible that cyber-criminals will decide that the established ransomware model no longer pays and that it’s time to develop a new attack method.

      What might that next attack look like? It’s impossible to say for sure. But it’s possible that a type of ransomware that skips the encryption and all of its overhead and uses simpler tactics such as large scale data extraction with the threat of exposure might do the trick against some victims. Think about what a wholesale release of your company’s private data do to your business? It’s worse than data encryption that you can remedy by restoring a backup, isn’t it?

      Wayne Rash
      Wayne Rash
      https://www.eweek.com/author/wayne-rash/
      Wayne Rash is a content writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×