The WannaCry ransomware attack in 2017 rendered up to 230,000 devices useless across the world. While the attack was neutralized, the event brought to light a previously hidden world. These are the mysteries surrounding the WannaCry Attack and the world of Cyber Warfare.

Hello, it has been a while. The further I went down this rabbit hole, the more questions I had therefore there is no singular mystery but rather multiple different mysteries all attached in some form to the same event. For writing purposes, italics indicates 'exposition' from myself. I have done a video which visualizes the event here.

[LONG]

Introduction:

In 2017 a massive cyber attack took down the National Health Service in England. Thousands of appointments and potentially life saving operations were delayed or cancelled, as well as the relocation of many Critical Patients.

This attack wasn’t just targeted at the NHS. The attack brought thousands of organizations, and government agencies to a standstill. The groundwork for this attack was laid years in advance.

Birth of the Exploit:

In 2009, windows 7 was released and was heavily adopted by industries and government agencies. As years past, new operating systems were released and subsequent updates to windows 7 less regular a due to this a small vulnerability formed. The MS17-010 exploit was discovered or created by the National Security Agency and was dubbed the β€˜Eternal Blue’ exploit. It worked by targeting a fault in any machine which uses SMBv1 (or Server Message Block version 1) file sharing protocol.

SMB is a protocol that Microsoft uses to allow the sharing of files between computers and other devices.

The exploit, Eternal Blue, which the NSA had discovered allowed attackers to implant the backdoor codenamed Double Pulsar onto a machine. Which would allow them to execute code on the target computer, otherwise known as a remote code execution vulnerability. In effect, this exploit allows hackers to control another person’s computer. It further was able to spread malicious data packets within networks, allowing for duplications of the malware to spread to other computers automatically. The NSA had utilized this exploit for 5 years, and the exact details of what they had used the exploit for are currently unknown. The so called β€˜Equation Group’, a highly sophisticated β€˜threat actor’, that earned its name from the groups extensive use of encryption is believed to be a group within the NSA. This group, The Equation Group, is regarded as the most skilled and best equipped cyber-threat. It is also suspected to be involved in many large cyber-attacks such as Stuxnet, however this is unconfirmed. The Equation Group is al

... keep reading on reddit ➑

πŸ‘︎ 301
πŸ’¬︎
πŸ‘€︎ u/RingedMysteries
πŸ“…︎ Jun 26 2021
🚨︎ report
Ransomware - WannaCry attack

My latest video delves into ransomware, a topic you may well see on the CISSP exam, and the famous WannaCry attack in particular:

https://youtu.be/jzqiiA_M-eA

It would be great to hear what you think of the video as I'm contemplating whether to make more videos like this and if so, future topics.

πŸ‘︎ 14
πŸ’¬︎
πŸ‘€︎ u/RWitchest
πŸ“…︎ Aug 20 2021
🚨︎ report
WANNACRY (2021) - The Story Behind The World's Largest Ransomware Attack [00:29:51] youtube.com/watch?v=PKHH_…
πŸ‘︎ 99
πŸ’¬︎
πŸ‘€︎ u/bulgrozzz
πŸ“…︎ Jun 10 2021
🚨︎ report
The WannaCry ransomware attack in 2017 rendered up to 230,000 devices useless across the world. From the NSA to North Korea, the history of the Wannacry hack and the many Cyber Threat groups which surround it are still a mystery. youtube.com/watch?time_co…
πŸ‘︎ 93
πŸ’¬︎
πŸ‘€︎ u/RingedMysteries
πŸ“…︎ Jun 27 2021
🚨︎ report
TIL about the WannaCry ransomware attack in 2017. It managed to infect over 200,000 computers in 150 countries making it the biggest ransomware attack in history. en.wikipedia.org/wiki/Wan…
πŸ‘︎ 60
πŸ’¬︎
πŸ‘€︎ u/yomamascub
πŸ“…︎ May 12 2021
🚨︎ report
UK government credits NCSC with β€˜resolving’ WannaCry ransomware attack to refute flak over intelligence body’s posh Westminster HQ rt.com/uk/530491-uk-gover…
πŸ‘︎ 3
πŸ’¬︎
πŸ‘€︎ u/Cropitekus
πŸ“…︎ Jul 28 2021
🚨︎ report
The WannaCry ransomware attack in 2017 rendered up to 230,000 devices useless across the world. While the attack was neutralized, the event brought to light a previously hidden world. These are the mysteries surrounding the WannaCry Attack and the world of Cyber Warfare. /r/UnresolvedMysteries/co…
πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/RingedMysteries
πŸ“…︎ Jul 20 2021
🚨︎ report
The WANNACRY Virus. (2021) The Wannacry ransomware attack crippled the NHS in the UK and many other organizations around the world, infecting up to 230,000 devices. This covers its origin as a cyberweapon developed by the NSA, and its bizarre journey into the hands of North Korean hackers [00:21:16] youtube.com/watch?v=dHab6…
πŸ‘︎ 23
πŸ’¬︎
πŸ‘€︎ u/RingedMysteries
πŸ“…︎ Jun 27 2021
🚨︎ report
Balance of the bitcoin wallets tied to the WannaCry ransomware attack [OC]
πŸ‘︎ 4k
πŸ’¬︎
πŸ‘€︎ u/keeferc
πŸ“…︎ May 17 2017
🚨︎ report
Boeing Hit by Wannacry Ransomware Attack

https://www.bloomberg.com/news/articles/2018-03-28/boeing-hit-by-wannacry-ransomware-attack-seattle-times-says

> β€œIt is metastasizing rapidly out of North Charleston and I just heard 777 (automated spar assembly tools) may have gone down,” Boeing engineer Mike VanderWel wrote in a memo cited by the Seattle Times. VanderWel said he was concerned that the virus would hit equipment used to test jetliners in the factory and potentially β€œspread to airplane software.”

> A similar cyberattack compromised companies such as FedEx Corp. and Nissan Motor Co. last year and crippled parts of the U.K.’s state-run National Health Service.

On an unrelated note, my workplace is dealing with an IT incident. Rumors has it that it started from someone who tried accessing a South Korean banking website and was prompted to install .exes or something. The department that was running only Windows 2000/XP isn't cooperating with the IT department (no idea why). I might post a separate thread about it when IT is finished putting out the dumpster fire, but since I'm a production engineer, not an IT admin/tech, anything I say would be observations or second/third-hand stories.

(Apparently South Korea requires all banks to use ActiveX, and some banks require users to install .exe programs, such as anti-keylogger software or ActiveX replacements, so I suppose the rumors have some basis of truth.)

πŸ‘︎ 55
πŸ’¬︎
πŸ‘€︎ u/COMPUTER1313
πŸ“…︎ Mar 28 2018
🚨︎ report
NHS 'could have prevented' WannaCry ransomware attack bbc.co.uk/news/technology…
πŸ‘︎ 203
πŸ’¬︎
πŸ‘€︎ u/hasharin
πŸ“…︎ Oct 27 2017
🚨︎ report
How to Accidentally Stop a Global Cyber Attacks - a.k.a. MalwareTech's account of how he stopped WannaCry ransomware malwaretech.com/2017/05/h…
πŸ‘︎ 131
πŸ’¬︎
πŸ“…︎ May 13 2017
🚨︎ report
Microsoft blames U.S. stockpiled vulnerability after WannaCry ransomware attack pcworld.com/article/31965…
πŸ‘︎ 57
πŸ’¬︎
πŸ‘€︎ u/jaymz668
πŸ“…︎ May 15 2017
🚨︎ report
WannaCry ransomware attacks 100 countries. attackers believed to have used the ETERNALBLUE exploit, which was allegedly developed by the NSA

BBC

  • " massive cyber-attack using tools believed to have been stolen from the US National Security Agency (NSA) has struck organisations around the world."
  • "reports of infections in 99 countries, including Russia and China."
  • "Among the worst hit was the National Health Service (NHS) in England and Scotland."
  • " malware spread quickly on Friday, with medical staff in the UK reportedly seeing computers go down 'one by one'."
  • "Throughout the day other, mainly European countries, reported infections."
  • "Some reports said Russia had seen more infections than any other single country. Domestic banks, the interior and health ministries, the state-owned Russian railway firm and the second largest mobile phone network were all reported to have been hit."
  • "Russia's interior ministry said 1,000 of its computers had been infected but the virus was swiftly dealt with and no sensitive data was compromised."
  • "The infections seem to be deployed via a worm"
  • "Some experts say the attack may have been built to exploit a weakness in Microsoft systems that had been identified by the NSA and given the name EternalBlue."
  • "The NSA tools were stolen by a group of hackers known as The Shadow Brokers, who made it freely available in April, saying it was a 'protest' about US President Donald Trump."
  • "...some cyber-security experts said some of the malware was real, but old."

Reuters Canada{Jeremy Wagstaff and Costas Pitas}

  • "...tricked victims into opening malicious malware attachments to spam emails that appeared to contain invoices, job offers, security warnings and other legitimate files."
  • "demanding payments of $300 to $600 to restore access. Security researchers said they observed some victims paying via the digital currency bitcoin, "
  • "Some experts said the threat had receded for now, in part because a British-based res
... keep reading on reddit ➑

πŸ‘︎ 79
πŸ’¬︎
πŸ‘€︎ u/acepar
πŸ“…︎ May 13 2017
🚨︎ report
WannaCry ransomware attack on NHS could have triggered NATO reaction, says German cybergeneral theregister.co.uk/2020/02…
πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/oaf357
πŸ“…︎ Feb 04 2020
🚨︎ report
WannaCry ransomware attack at LG Electronics takes systems offline zdnet.com/article/wannacr…
πŸ‘︎ 28
πŸ’¬︎
πŸ‘€︎ u/VincentLaurent
πŸ“…︎ Aug 21 2017
🚨︎ report
WannaCry attack: 70% of the ATMs in India are particularly vulnerable to ransomware firstpost.com/business/wa…
πŸ‘︎ 47
πŸ’¬︎
πŸ‘€︎ u/themaxviwe
πŸ“…︎ May 15 2017
🚨︎ report
WannaCry ransomware: Hospitals were warned to patch system to protect against cyber-attack - but didn't | ZDNet zdnet.com/article/wannacr…
πŸ‘︎ 70
πŸ’¬︎
πŸ‘€︎ u/Abscess2
πŸ“…︎ Oct 27 2017
🚨︎ report
With the dust now settling after β€œWannaCry”, the biggest ransomware attack in history, cybersecurity experts are taking a deep dive into how it was carried out, what can be done to protect computers from future breaches and, trickiest of all, who is really to blame. abcnews.go.com/Internatio…
πŸ‘︎ 35
πŸ’¬︎
πŸ‘€︎ u/sound_tech
πŸ“…︎ Jun 03 2017
🚨︎ report
Bitcoin income from WannaCry ransomware attacks expected to increase bravenewcoin.com/news/bit…
πŸ‘︎ 17
πŸ’¬︎
πŸ‘€︎ u/Lukovka
πŸ“…︎ May 15 2017
🚨︎ report
WannaCry 'hero' to plead not guilty to accusation he wrote banking malware. US prosecutors claim Marcus Hutchins, hailed as β€˜accidental hero’ for stopping major ransomware attack, admitted to creating Kronos malware targeting banks. theguardian.com/technolog…
πŸ‘︎ 17
πŸ’¬︎
πŸ‘€︎ u/trai_dep
πŸ“…︎ Aug 05 2017
🚨︎ report
"WannaCry" ransomware attack losses could reach $4 billion cbsnews.com/news/wannacry…
πŸ‘︎ 23
πŸ’¬︎
πŸ‘€︎ u/irrlicht
πŸ“…︎ May 17 2017
🚨︎ report
The US Needs to Get Serious About Securing the Internet of Hackable Things - In an exclusive Motherboard op-ed, US Senator Mark Warner says last month's global WannaCry ransomware attack should be a wake up call for connected device security. motherboard.vice.com/en_u…
πŸ‘︎ 48
πŸ’¬︎
πŸ‘€︎ u/anutensil
πŸ“…︎ Jun 08 2017
🚨︎ report
Microsoft blames U.S. stockpiled vulnerability after WannaCry ransomware attack pcworld.com/article/31965…
πŸ‘︎ 21
πŸ’¬︎
πŸ‘€︎ u/jaymz668
πŸ“…︎ May 15 2017
🚨︎ report
NSA should β€˜shoulder some blame’ for WannaCry ransomware attack – Chinese state media rt.com/news/388693-nsa-wa…
πŸ‘︎ 7
πŸ’¬︎
πŸ‘€︎ u/CB-Nomad
πŸ“…︎ May 17 2017
🚨︎ report
Tim Cook’s refusal to help FBI hack iPhone is validated by β€˜WannaCry’ ransomware attack bgr.com/2017/05/15/wannac…
πŸ‘︎ 42
πŸ’¬︎
πŸ‘€︎ u/thatshirtman
πŸ“…︎ May 15 2017
🚨︎ report
Dear health professionals of Meddit, how has the recent WannaCry ransomware attack affected you?
πŸ‘︎ 21
πŸ’¬︎
πŸ‘€︎ u/Lampyris
πŸ“…︎ May 14 2017
🚨︎ report

Please note that this site uses cookies to personalise content and adverts, to provide social media features, and to analyse web traffic. Click here for more information.