Fraud News

WannaCry Threat – 15th May Update

Author: Kaspersky Lab / Source: Information Security Buzz

On Friday 12th May, organizations across the world were hit by a massive ransomware attack, named WannaCry, which exploited a (now patched) Microsoft Windows vulnerability revealed in the Shadowbrokers dump on March 14.

Kaspersky Lab researchers have continued to track the evolution of the threat over the weekend.

Evolution of the ransomware

The total number of variants in circulation on Monday 11th is still unclear – but over the weekend two notable variants emerged. Kaspersky Lab does not believe any of these variants were created by the original authors – most likely they were patched by others keen to exploit the attack for their own ends.

The first one started spreading on Sunday morning, at around 02.00 UTC/GMT and was patched to connect to a different domain. Kaspersky Lab has so far noted three victims for this variant, located in Russia and Brazil.

The second variation that appeared during the weekend appears to have been patched to remove the killswitch. This variant does not appear to be spreading, possibly due to the fact it has a bug.

Number of infections to date

Further analysis of network logs suggests the WannaCry ransomware may have started to spread on Thursday 11 May.

It is difficult to estimate the total number of infections. Our own telemetry indicates that over 45,000 users have been attacked, but this represents a fraction of the total numbers of attacks (reflecting Kaspersky Lab’s customer share.)

A more accurate picture of the world situation can be drawn from the sinkhole for the kill switch hardcoded in most versions of WannaCry: Currently the Malwaretech sinkhole, which is collecting redirections from the ‘kill switch’ code, has registered about 200,000 hits.

It should be mentioned that this number does not include infections inside corporate networks where a proxy server is required for connecting to the internet, meaning that the real number of victims might easily be larger.

Since 06.00 UTC/GMT on Monday 15th May, Kaspersky Lab has noted about 500 new attempted WannaCry attacks across its customer base – by comparison, on Friday 12th there were six times as many attempts during the first hour alone. This suggests the infection may be coming under control.

Kaspersky Lab advice to reduce the risk of infection

  • Install the official patch from Microsoft that closes the vulnerability used in the attack (there are also patches available for Windows XP, Windows 8, and Windows Server 2003)
  • Ensure that security solutions are switched on all nodes of the network
  • For those who do not use Kaspersky Lab solutions, we suggest installing the free Kaspersky Anti-Ransomware Toolfor business (KART).
  • If Kaspersky Lab’s solution is used, ensure that it includes the System Watcher, a behavioral proactive detection component, and that it is switched on
  • Run the Critical Area Scan task in Kaspersky Lab’s solution to detect possible infection as soon as possible (otherwise it will be detected automatically, if not switched off, within 24 hours).
  • Reboot the system after detecting MEM: Trojan.Win64.EquationDrug.gen
  • Use Customer-Specific Threat Intelligence Reporting services to be informed about possible attacks
  • WannaCry is also targetingembedded systems. We recommend ensuring that dedicated security solutions for embedded systems are installed, and that they have both anti-malware protection and Default Deny functionality enabled.

Technical data

A detailed description of the WannaCry attack method, and Indicators of Compromise can be found in the blogpost from Friday 12th on Securelist. An update blogpost will be posted later today.

Kaspersky Lab network logs and data from the SANS ISC (https://isc.sans.edu/port.html?port=445)

The two new variants of the WannaCry ransomware are as follows:

Variant 1: md5: d5dcd28612f4d6ffca0cfeaefd606bcf

Connected to: ifferfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com

Variant 2: md5: d724d8cc6420f06e8a48752f0da11c66

WannaCry Q&A

What is WannaCry?

WannaCry comes in two parts. First of all, it’s an exploit which purposes are infection and propagation. And the second part is an encryptor that is downloaded to the computer…

Click here to read more

Click Here to Read More

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Most Popular News

To Top