{"id":4519,"date":"2017-05-15T17:43:31","date_gmt":"2017-05-15T09:43:31","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=4519"},"modified":"2017-05-15T17:43:31","modified_gmt":"2017-05-15T09:43:31","slug":"wannacry-ransomware-foiled-domain-killswitch","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2017\/05\/wannacry-ransomware-foiled-domain-killswitch\/","title":{"rendered":"WannaCry Ransomware Foiled By Domain Killswitch"},"content":{"rendered":"

Whilst I was away on a tropical island enjoying myself the Infosec Internet was on fire with news of the global WannaCry ransomware threat which showed up in the UK NHS and was spreading across 74 different countries.<\/p>\n

\"WannaCry<\/p>\n

The Ransomware seems to be the first that is P2P using an SMB exploit from the NSA Leak<\/a> just last month.<\/p>\n

The WannaCrypt ransomware worm, aka WanaCrypt or Wcry, today exploded across 74 countries, infecting hospitals, businesses including Fedex, rail stations, universities, at least one national telco, and more organizations.<\/p>\n

In response, Microsoft has released emergency security patches to defend against the malware for unsupported versions of Windows, such as XP and Server 2003, as well as modern builds.<\/p>\n

To recap, WannaCrypt is installed on vulnerable Windows computers by a worm that spreads across networks by exploiting a vulnerability in Microsoft’s SMB file-sharing services. It specifically abuses a bug designated MS17-010 that Redmond patched in March for modern versions of Windows, and today for legacy versions \u2013 all remaining unpatched systems are therefore vulnerable and can be attacked.<\/p>\n

This bug was, once upon a time, exploited by the NSA to hijack and spy on its targets. Its internal tool to do this, codenamed Eternalblue, was stolen from the agency, and leaked online in April \u2013 putting this US government cyber-weapon into the hands of any willing miscreant. Almost immediately, it was used to hijack thousands of machines on the internet.<\/p>\n

Now someone has taken that tool and strapped it to ransomware: the result is a variant of WannaCrypt, which spreads via SMB and, after landing on a computer, encrypts as many files as it can find. It charges $300 or $600 in Bitcoin to restore the documents. It is adept at bringing offices and homes to a halt by locking away their data.<\/p><\/blockquote>\n