SlideShare a Scribd company logo
2
Most read
5
Most read
6
Most read
WannaCry Ransomware
The biggest cyber-attack extortion in the history of the internet.
What made us cry?
> On May 12, 2017 the world witnessed the biggest ever cyber-attack in the history
of internet, WannaCry - a ransomware which rendered computers across the
globe useless.
> WannaCry hit more than 200,000 organizations from over 150 countries,
shutting down everything from telecoms in Spain to the Interior ministry of
Russia, and affecting 47 NHS trusts in United Kingdom.
> It spreads to other computers via a Server Message Block (SMB) remote code
execution vulnerability in Microsoft Windows computers (MS17-010). This
exploit is named as Eternal Blue.
> This malware locked all the data in the computer and displayed a message
demanding a ransom in exchange to unblock the data.
> The message also indicated that the payment amount will be doubled after
three days. Also, the files will be deleted if payment is not made after seven
days.
Image source: Symantec
> Ransomware is a malicious software program which encrypts all data in a computer
and blocks access to them.
> Often, this malware masquerades as an innocent email attachment or a legitimate
website link conning users to open it.
> Once this malicious file is opened, it attacks the hard drive and encrypts all the files.
> A ransom is demanded for decrypting the files and if the user doesn't oblige, the files
will be deleted. A very short time frame, usually just a few days, is imposed to rack up
pressure.
> The ransom is demanded to be paid in the form of digital currency.
> The use of ransomeware has become an increasing trend among hackers looking for a
quick payout.
What is ransomware?
> WannaCry ransomware demanded $300 worth of the crypto-currency Bitcoin to
decrypt the contents of the affected computers.
> The payment was demanded in bitcoins as this digital currency, popular among
cybercriminals, is decentralised, unregulated and impossible to trace.
> Though $300 might look very small, multiplied by 300,000, the approximate
number of computers affected by WannaCry, the amount becomes humongous.
> But the more important cost - the time lost, the files damaged beyond repair and
other unexpected collateral damage caused by the malware, will be very difficult
to ascertain.
How much was demanded? Why in bitcoins?
> WannaCry shutdown many businesses across the globe, including the European manufacturing plants
of automotive giants Nissan
> Healthcare sector was not spared too; Hospitals in UK, including London's Bart Health NHS Trust, had to
cut back services, and doctors were forced to turn away patients and cancel appointments, after being
forced to shut down equipment to avoid infection.
> Though all patients' records and doctors' filed are claimed to be unaffected by WannaCry, one can never
be sure.
> Overall, organizations are on an overdrive to address these challenges caused by WannaCry:
o Disrupted business operations
o Risk of losing sensitive or patented information
o Financial cost of restoring the systems and data
o Dip in organization’s reputation
Impact of this attack
Were we saved?
> Marcus Hutchins, a cyber security analyst, offered a temporary solution for WannaCry ransomware.
> He analyzed the code used by the worm and found that it referenced a website URL which didn’t exist.
> He bought the domain for $10 and forwarded it to a sinkhole server where it couldn't do any damage. This acted
as a ‘kill switch’ to disable the code.
> Though this ingenious solution may have saved the day, he claims this is definitely not the end to ransomware
problems.
> His statement definitely hints that we could be in for a major war with ramsomware hackers.
Marcus Hutchins says:
“We have stopped this one, but there will be another one coming and it will not be stoppable by us.
There’s a lot of money in this. There’s no reason for them to stop. It’s not really much effort for them to
change the code and then start over. So there’s a good chance they are going to do it… maybe not this
weekend, but quite likely on Monday morning”.
> Victims are advised to not encourage the attackers by succumbing to their
demands. Also, there is no assurance that the affected files will be decrypted once
the ransom is paid.
> The best option is to restore the data from backup. If it isn't an option, try
decrypting the files using recovery tools.
> Work with data recovery experts who can reverse engineer malware and help gain
access to your data.
> Ransomware usually exploit the most recently discovered loopholes and
drawbacks in software systems‘. It is therefore prudent to have the anti-virus and
firewall programs always updated, to prevent infections from originating and
spreading.
If you're a victim, should you pay the ransom?
> Though WannaCry may have been stopped for now, it doesn’t mean you’re completely
immune to it.
> The WannaCry ransomware affects all machines that are using Windows operating
system.
> A security flaw, originally exploited by the U.S. National Security Agency (NSA), was
leaked. It is now being used by hackers to create havoc. If your system runs on
Windows OS, it could be at risk.
> Experts have predicted that many other ransomware strains will make a round soon.
Keep a lookout and secure all your data.
> Prevention is always better than cure. So, take all necessary precautions to save
yourself from the ransomware attack.
Are you at risk?
> Here are few tips to protect your computer from WannaCry ransomware.
> For individuals and small businesses:
o Update your Windows software to the latest edition.
o Backing up data is key! Make a copy and secure it.
o Scan your systems for viruses and malwares using the latest anti-virus software in the market.
> For large organizations:
o To protect against WannaCry, apply the latest Microsoft security patches.
o Backup all your data and store it in a secure location.
o Scan all outgoing and incoming emails with attachments.
o Update anti-virus software and conduct regular scans.
o Spread awareness among employees to identify scams, malicious links and emails.
How to protect yourself?
Don’t let WannaCry make you cry!
For more information, click here.

More Related Content

PPTX
What is Ransomware
PPTX
WannaCry ransomware attack
PPTX
Ransomware : A cyber crime without solution ? by Prashant Mali
PPTX
seminar report on What is ransomware
PPT
Stuxnet - Case Study
PPTX
Ransomware
PDF
Stuxnet
PPTX
cyber security notes
What is Ransomware
WannaCry ransomware attack
Ransomware : A cyber crime without solution ? by Prashant Mali
seminar report on What is ransomware
Stuxnet - Case Study
Ransomware
Stuxnet
cyber security notes

What's hot (20)

PDF
Ransomware: Wannacry
PPTX
WannaCry / Wannacrypt Ransomware
PPT
PPTX
Ransomware attack
PPTX
Ransomware
PPT
Wannacry-A Ransomware Attack
PPTX
Wannacry
PPTX
Cyber attack
PDF
What is Ransomware?
PPTX
Ransomware Attack.pptx
PDF
PPTX
Ransomware
PPTX
Cyber crime and security
PPTX
Threat modeling web application: a case study
PPTX
WannaCry ransomware outbreak - what you need to know
PPTX
PPTX
Ethical hacking - Footprinting.pptx
PDF
The rise of malware(ransomware)
PPTX
Cyber security
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
Ransomware: Wannacry
WannaCry / Wannacrypt Ransomware
Ransomware attack
Ransomware
Wannacry-A Ransomware Attack
Wannacry
Cyber attack
What is Ransomware?
Ransomware Attack.pptx
Ransomware
Cyber crime and security
Threat modeling web application: a case study
WannaCry ransomware outbreak - what you need to know
Ethical hacking - Footprinting.pptx
The rise of malware(ransomware)
Cyber security
Cybersecurity Attack Vectors: How to Protect Your Organization
Ad

Similar to WannaCry Ransomware (20)

PPTX
SECURITY IN COMPUTING.pptx
PDF
Wannacry Virus
PDF
Ransomware (1).pdf
PPTX
Defend Your Company Against Ransomware
PPT
Wanna cry
PPT
WannaCrygehieiwkwjwhwhwiwiwjwhhwjwjhw.ppt
PPT
WannaCryppthisiiskhsisksksksjgshsksksk.ppt
PDF
Get Smart about Ransomware: Protect Yourself and Organization
PDF
Ransomware hostage rescue manual
PPTX
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
PDF
Ransomware and tips to prevent ransomware attacks
PDF
ALARMING RANSOMWARE
PDF
Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
PPTX
Ransomware and email security ver - 1.3
PPTX
RANSOMWARE.pptx
PPTX
Ransomware attack and its effects on cyber crimes
PDF
Combating RANSOMWare
PDF
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
PDF
Ransomware ly
SECURITY IN COMPUTING.pptx
Wannacry Virus
Ransomware (1).pdf
Defend Your Company Against Ransomware
Wanna cry
WannaCrygehieiwkwjwhwhwiwiwjwhhwjwjhw.ppt
WannaCryppthisiiskhsisksksksjgshsksksk.ppt
Get Smart about Ransomware: Protect Yourself and Organization
Ransomware hostage rescue manual
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
Ransomware and tips to prevent ransomware attacks
ALARMING RANSOMWARE
Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Ransomware and email security ver - 1.3
RANSOMWARE.pptx
Ransomware attack and its effects on cyber crimes
Combating RANSOMWare
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Ransomware ly
Ad

More from Zoho Corporation (20)

PPTX
The Future of integrated Identity and Access Management
PPTX
One portal for all your login needs - ADSelfService Plus Single sign-on.
PDF
Using indicators to deal with security attacks
PPTX
Ensuring security and consistency of users' self-service actions in Active Di...
PPTX
Empowering ServiceNow help desk for Active Directory management
PPTX
Decrypting the security mystery with SIEM (Part 1) ​
PPTX
Decrypting the security mystery with SIEM (Part 2) ​
PPTX
Overcoming the challenges of Office 365 user management in hybrid environments​
PPTX
Self-service password management and single sign-on for on-premises AD and cl...
PPTX
Active Directory security and compliance: Comprehensive reporting for key sec...
PPTX
7 tips to simplify Active Directory Management ​
PDF
Effective User Life Cycle Management in Active Directory
PPTX
Protecting Windows Passwords and Preventing Windows Computer / Password Attacks
PPTX
Change Monitoring of Active Directory
PPTX
Controlling Delegation of Windows Servers and Active Directory
PPTX
Microsoft, Active Directory, Security Management Tools and Where ManageEngine...
PDF
ALIGN Technology timely alerts its employees of their password expiry using A...
PDF
Unisource Worldwide Inc - An ADSelfservice Plus Case study
PDF
Case study-self-password-management-camh
PDF
Case study-administrative-office-schwarzwald-baar-kreis
The Future of integrated Identity and Access Management
One portal for all your login needs - ADSelfService Plus Single sign-on.
Using indicators to deal with security attacks
Ensuring security and consistency of users' self-service actions in Active Di...
Empowering ServiceNow help desk for Active Directory management
Decrypting the security mystery with SIEM (Part 1) ​
Decrypting the security mystery with SIEM (Part 2) ​
Overcoming the challenges of Office 365 user management in hybrid environments​
Self-service password management and single sign-on for on-premises AD and cl...
Active Directory security and compliance: Comprehensive reporting for key sec...
7 tips to simplify Active Directory Management ​
Effective User Life Cycle Management in Active Directory
Protecting Windows Passwords and Preventing Windows Computer / Password Attacks
Change Monitoring of Active Directory
Controlling Delegation of Windows Servers and Active Directory
Microsoft, Active Directory, Security Management Tools and Where ManageEngine...
ALIGN Technology timely alerts its employees of their password expiry using A...
Unisource Worldwide Inc - An ADSelfservice Plus Case study
Case study-self-password-management-camh
Case study-administrative-office-schwarzwald-baar-kreis

Recently uploaded (20)

PPTX
Visualising Data with Scatterplots in IBM SPSS Statistics.pptx
PPTX
Presentation of Computer CLASS 2 .pptx
PDF
A Practical Breakdown of Automation in Project Management
PPTX
AIRLINE PRICE API | FLIGHT API COST |
PDF
Community & News Update Q2 Meet Up 2025
PPTX
Dynamic Solutions Project Pitch Presentation
PPTX
Materi-Enum-and-Record-Data-Type (1).pptx
PDF
The Future of Smart Factories Why Embedded Analytics Leads the Way
PPTX
What to Capture When It Breaks: 16 Artifacts That Reveal Root Causes
PDF
Build Multi-agent using Agent Development Kit
PDF
The Role of Automation and AI in EHS Management for Data Centers.pdf
PPTX
How a Careem Clone App Allows You to Compete with Large Mobility Brands
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
Perfecting Gamer’s Experiences with Performance Testing for Gaming Applicatio...
PDF
Emergency Mustering solutions – A Brief overview
PDF
Best Practices for Rolling Out Competency Management Software.pdf
PDF
QAware_Mario-Leander_Reimer_Architecting and Building a K8s-based AI Platform...
PDF
Best Mobile App Development Company in Lucknow - Code Crafter Web Solutions
PDF
IEEE-CS Tech Predictions, SWEBOK and Quantum Software: Towards Q-SWEBOK
PPTX
Benefits of DCCM for Genesys Contact Center
Visualising Data with Scatterplots in IBM SPSS Statistics.pptx
Presentation of Computer CLASS 2 .pptx
A Practical Breakdown of Automation in Project Management
AIRLINE PRICE API | FLIGHT API COST |
Community & News Update Q2 Meet Up 2025
Dynamic Solutions Project Pitch Presentation
Materi-Enum-and-Record-Data-Type (1).pptx
The Future of Smart Factories Why Embedded Analytics Leads the Way
What to Capture When It Breaks: 16 Artifacts That Reveal Root Causes
Build Multi-agent using Agent Development Kit
The Role of Automation and AI in EHS Management for Data Centers.pdf
How a Careem Clone App Allows You to Compete with Large Mobility Brands
PTS Company Brochure 2025 (1).pdf.......
Perfecting Gamer’s Experiences with Performance Testing for Gaming Applicatio...
Emergency Mustering solutions – A Brief overview
Best Practices for Rolling Out Competency Management Software.pdf
QAware_Mario-Leander_Reimer_Architecting and Building a K8s-based AI Platform...
Best Mobile App Development Company in Lucknow - Code Crafter Web Solutions
IEEE-CS Tech Predictions, SWEBOK and Quantum Software: Towards Q-SWEBOK
Benefits of DCCM for Genesys Contact Center

WannaCry Ransomware

  • 1. WannaCry Ransomware The biggest cyber-attack extortion in the history of the internet.
  • 2. What made us cry? > On May 12, 2017 the world witnessed the biggest ever cyber-attack in the history of internet, WannaCry - a ransomware which rendered computers across the globe useless. > WannaCry hit more than 200,000 organizations from over 150 countries, shutting down everything from telecoms in Spain to the Interior ministry of Russia, and affecting 47 NHS trusts in United Kingdom. > It spreads to other computers via a Server Message Block (SMB) remote code execution vulnerability in Microsoft Windows computers (MS17-010). This exploit is named as Eternal Blue. > This malware locked all the data in the computer and displayed a message demanding a ransom in exchange to unblock the data. > The message also indicated that the payment amount will be doubled after three days. Also, the files will be deleted if payment is not made after seven days. Image source: Symantec
  • 3. > Ransomware is a malicious software program which encrypts all data in a computer and blocks access to them. > Often, this malware masquerades as an innocent email attachment or a legitimate website link conning users to open it. > Once this malicious file is opened, it attacks the hard drive and encrypts all the files. > A ransom is demanded for decrypting the files and if the user doesn't oblige, the files will be deleted. A very short time frame, usually just a few days, is imposed to rack up pressure. > The ransom is demanded to be paid in the form of digital currency. > The use of ransomeware has become an increasing trend among hackers looking for a quick payout. What is ransomware?
  • 4. > WannaCry ransomware demanded $300 worth of the crypto-currency Bitcoin to decrypt the contents of the affected computers. > The payment was demanded in bitcoins as this digital currency, popular among cybercriminals, is decentralised, unregulated and impossible to trace. > Though $300 might look very small, multiplied by 300,000, the approximate number of computers affected by WannaCry, the amount becomes humongous. > But the more important cost - the time lost, the files damaged beyond repair and other unexpected collateral damage caused by the malware, will be very difficult to ascertain. How much was demanded? Why in bitcoins?
  • 5. > WannaCry shutdown many businesses across the globe, including the European manufacturing plants of automotive giants Nissan > Healthcare sector was not spared too; Hospitals in UK, including London's Bart Health NHS Trust, had to cut back services, and doctors were forced to turn away patients and cancel appointments, after being forced to shut down equipment to avoid infection. > Though all patients' records and doctors' filed are claimed to be unaffected by WannaCry, one can never be sure. > Overall, organizations are on an overdrive to address these challenges caused by WannaCry: o Disrupted business operations o Risk of losing sensitive or patented information o Financial cost of restoring the systems and data o Dip in organization’s reputation Impact of this attack
  • 6. Were we saved? > Marcus Hutchins, a cyber security analyst, offered a temporary solution for WannaCry ransomware. > He analyzed the code used by the worm and found that it referenced a website URL which didn’t exist. > He bought the domain for $10 and forwarded it to a sinkhole server where it couldn't do any damage. This acted as a ‘kill switch’ to disable the code. > Though this ingenious solution may have saved the day, he claims this is definitely not the end to ransomware problems. > His statement definitely hints that we could be in for a major war with ramsomware hackers. Marcus Hutchins says: “We have stopped this one, but there will be another one coming and it will not be stoppable by us. There’s a lot of money in this. There’s no reason for them to stop. It’s not really much effort for them to change the code and then start over. So there’s a good chance they are going to do it… maybe not this weekend, but quite likely on Monday morning”.
  • 7. > Victims are advised to not encourage the attackers by succumbing to their demands. Also, there is no assurance that the affected files will be decrypted once the ransom is paid. > The best option is to restore the data from backup. If it isn't an option, try decrypting the files using recovery tools. > Work with data recovery experts who can reverse engineer malware and help gain access to your data. > Ransomware usually exploit the most recently discovered loopholes and drawbacks in software systems‘. It is therefore prudent to have the anti-virus and firewall programs always updated, to prevent infections from originating and spreading. If you're a victim, should you pay the ransom?
  • 8. > Though WannaCry may have been stopped for now, it doesn’t mean you’re completely immune to it. > The WannaCry ransomware affects all machines that are using Windows operating system. > A security flaw, originally exploited by the U.S. National Security Agency (NSA), was leaked. It is now being used by hackers to create havoc. If your system runs on Windows OS, it could be at risk. > Experts have predicted that many other ransomware strains will make a round soon. Keep a lookout and secure all your data. > Prevention is always better than cure. So, take all necessary precautions to save yourself from the ransomware attack. Are you at risk?
  • 9. > Here are few tips to protect your computer from WannaCry ransomware. > For individuals and small businesses: o Update your Windows software to the latest edition. o Backing up data is key! Make a copy and secure it. o Scan your systems for viruses and malwares using the latest anti-virus software in the market. > For large organizations: o To protect against WannaCry, apply the latest Microsoft security patches. o Backup all your data and store it in a secure location. o Scan all outgoing and incoming emails with attachments. o Update anti-virus software and conduct regular scans. o Spread awareness among employees to identify scams, malicious links and emails. How to protect yourself?
  • 10. Don’t let WannaCry make you cry! For more information, click here.