WannaCry

  • Attack that combined a known and highly-publicized exploit

  • Ransomware that would encrypt files and demand bitcoin as payment for the encryption keys

How it Works

  • Executes two components:

    • one that attempts to exploit a known SMB vulnerability

    • one that had the ransomware

  • Dropper would attempt to call out domains and if the domain reached out to was valid, it would stop.

  • If a domain was not reached, it would then change registry keys, create services, and encrypt files (changing the extensions to .WNCRY)

  • Registry keys would display a message indicating what the ransom was to get the key to decrypt the files

  • The service that was created was used to spread via SMB to other vulnerable systems the computer could access

    • It would scan from an infected computer for connections and systems that were still vulnerable to this exploit and when it discovered one, the weaponized exploit would run and gain remote code execution on the next machine

Remediation

  • Security researcher Marcus Hutchins discovered:

    • the domain name was hardcoded into the exploit itself

    • the domain was unregistered.

  • He registered the domain and set up a sinkhole server

    • this stopped WannaCry from completing full execution of the ransomware and spreading

Last updated