WannaCry ransomware: Researcher halts its spread by registering domain for $10.69
Now is the time to backup your data and update your systems!
Source: Hackread.com
Author: JAHANZAIB HASSAN
Last year the Internet was taken down by cyber criminals through a massive Distributed Denial of Service Attack (DDoS) attack using the infamous Mirai malware. But last Friday afternoon, almost 99 countries including Russia, UK, USA and Australia became victims of a worldwide mass cyber-attack that has been reported to have caused major disruptions to systems that were being used by hospitals, companies, and other institutions.
The Shadow Brokers and the NSA
An unknown hacking group launched ransomware attack to a number of computers worldwide that is seemingly powered by a hacking tool developed by the National Security Agency for spying purposes.
The tool got leaked online by the âShadow Brokersâ group as part of their agenda to accumulate hacking tools developed by the agency. The tool is apparently given the name âEternal Blueâ and it exploits a vulnerability in Microsoft Windows.
What does the vulnerability to do?
According to experts, the vulnerability in Microsoftâs flagship operating system can be exploited by Eternal Blue which blocks access to a computer completely. What is more, is that the hacking group demanded a sum of $600 from the victims if they wanted to re-access their systems and de-encrypt the files accordingly.
Who has been affected?
Up till now, almost 75,000 computers have been reported to have become the victim of the cyber-attack. Moreover, over 40 NHS organizations had been affected initially on Friday in the UK, disrupting the entire health system of the country.
Experts say that the ransomware was spreading at an exponential rate of five million emails per hour resulting in the virus affecting a number of other countries as well, including Australia, Germany, Mexico, Italy, Belgium, France and Russia.
Also, FedEx, one of the worldâs leading courier organizations, had its entire system brought down. The German rail system also had its ticketing system hijacked by the ransomware.
However, none of these were as big as the disruption which took place in Spainâs major telecommunication company, Telefonica. This was accompanied by attacks made on the power firm, Iberdrola, and the utility firm Gas Natural.
How was the attack carried out and stopped?
A security researcher going by the online handle of @MalwareTechBlog told AFP that the ransomware was spreading due to being connected to an unregistered domain. The researcher, therefore, said that the spread can be stopped by registering the domain and updating the systems immediately.
According to The Guardian, @MalwareTechBlog with the assistance of Darien Huss from security firm Proofpoint found and activated a âkill switchâ in the malicious software. The switch was hardcoded into the malware in case the creator wanted to stop it spreading. This involved a very long nonsensical domain name that the malware makes a request to â just as if it was looking up any website â and if the request comes back and shows that the domain is live, the kill switch takes effect and the malware stops spreading.
âI saw it wasnât registered and thought, âI think Iâll have that.â The purchase cost him $10.69. Immediately, the domain name was registering thousands of connections every second. They get the accidental hero award of the day,â said Proofpointâs Ryan Kalember. âThey didnât realize how much it probably slowed down the spread of this ransomware.â
The time that @malwaretechblog registered the domain was too late to help Europe and Asia, where many organizations were affected. But it gave people in the US more time to develop immunity to the attack by patching their systems before they were infected, said Kalember.
Also, many NHS organizations had Windows XP installed on their computers. Microsoft long stopped supporting the old version of Windows and hence the ransomware took advantage of this and was able to spread so conveniently. The old operating system did not alert the users of any viruses and did not have updates against such threats.
Microsoftâs take on the situation
A Microsoftâs spokesperson said that those who had enabled updates and ï»żçć©ćŁ« had the companyâs free antivirus software installed were not affected. Also, the company released an update earlier today which detects this threat as Ransom: Win32/WannaCrypt.
The NHS system was the most badly hit
Soon after the attack, various hospitals postponed non-urgent appointments and ambulances changed routes. The systems were made to shut down altogether with doctors complaining about the major delays that occurred as a result. Up till now, all that is known is that various organizations have paid the demanded amount in Bitcoin. However, since all bitcoin transactions are recorded in a public ledger, it is hard to tell specifically which organizations paid the ransom.
At the time of publishing this article, the attacks were stopped. The @MalwareTechBlog also released in-depth details highlighting how he was able to accidentally stop the attack which can be read here.