An unprecedented wave of ransomware infections is hitting organisations in all industries around the world. The culprit: WannaCry/WCry ransomware. Digital security firm Trend Micro reveals how to help defend your business against its devastating impacts.
Trend Micro has been tracking WannaCry since its emergence in the wild in April 2017. Here’s what users and enterprises need to know about this widespread threat and what can be done to defend against it.
Several firms in Europe were the first to report having their mission-critical Windows systems locked, showing a ransom note. This quickly developed into one of the most widespread ransomware outbreaks currently affecting a large number of organisations around the world.
Some affected organisations had to take their IT infrastructure offline, with victims in the healthcare industry experiencing delayed operations and forced to turn away patients until processes could be re-established.
Who is affected?
This variant of the WannaCry ransomware attacks older Windows-based systems, and is leaving a trail of significant damage in its wake.
Based on Trend Micro’s initial telemetry, Europe has the highest number of detection for the WannaCry ransomware. The Middle East, Japan and several countries in the Asia-Pacific (APAC) region show substantial infection rates as well.
WannaCry’s infections were seen affecting various enterprises, including those in healthcare, manufacturing, energy (oil and gas), technology, food and beverage, education, media and communications, and government.
Due to the widespread nature of this campaign, it does not appear to be targeting specific victims or industries.
What does WannaCry ransomware do?
WannaCry ransomware targets and encrypts 176 file types. Some of the file types WannaCry targets are database, multimedia and archive files, as well as Office documents.
In its ransom note, which supports 27 languages, it initially demands US$300 worth of Bitcoins from its victims — an amount that increases incrementally after a certain time limit.
The victim is also given a seven-day limit before the affected files are deleted — a commonly used fear-mongering tactic.
WannaCry leverages CVE-2017-0144, a vulnerability in Server Message Block (SMB), to infect systems. The security flaw is attacked using an exploit leaked by the Shadow Brokers group — the “EternalBlue” exploit, in particular.
Microsoft’s Security Response Center (MSRC) team addressed the vulnerability via MS17-010 released on March 2017.
What makes WannaCry’s impact pervasive is its capability to propagate. Its worm-like behaviour allows WannaCry to spread across networks, infecting connected systems without user interaction.
All it takes is for one user on a network to be infected to put the whole network at risk. WannaCry’s propagation capability is reminiscent of ransomware families like SAMSAM, HDDCryptor, and several variants of Cerber — all of which can infect systems and servers connected to the network.
What can you do?
WannaCry highlights the real-life impact of ransomware: crippled systems, disrupted operations, marred reputations, and the financial losses resulting from being unable to perform normal business functions—not to mention the cost of incident response and clean up.
Here are some of the solutions and best practices that organisations can adopt and implement to safeguard their systems from threats like WannaCry:
- The ransomware exploits a vulnerability in SMB server. Patching is critical for defending against attacks that exploit security flaws. A patch for this issue is available for Windows systems, including those no longer supported by Microsoft. When organisations can’t patch directly, using a virtual patch can help mitigate the threat.
- Deploying firewalls and detection and intrusion prevention systems can help reduce the spread of this threat. A security system that can proactively monitor attacks in the network also helps stops these threats.
- Aside from using an exploit to spread, WannaCry reportedly also uses spam as entry point. Identifying red flags on socially engineered spam emails that contain system exploits helps. IT and system administrators should deploy security mechanisms that can protect endpoints from email-based malware.
- WannaCry drops several malicious components in the system to conduct its encryption routine. Application control based on a white list can prevent unwanted and unknown applications from executing. Behaviour monitoring can block unusual modifications to the system. Ransomware uses a number of techniques to infect a system; defenders should do the same to protect their systems.
- WannaCry encrypts files stored on local systems and network shares. Implementing data categorisation helps mitigate any damage incurred from a breach or attack by protecting critical data in case they are exposed.
- Network segmentation can also help prevent the spread of this threat internally. Good network design can help contain the spread of this infection and reduce its impact on organisations.
- Disable the SMB protocol on systems that do not require it. Running unneeded services gives more ways for an attacker to find an exploitable vulnerability
Originally published on the Trend Micro website, and republished by My Business with permission.