WannaCry Ransomware Update 16 May 2017

K2 Integrity
Contact

K2 Intelligence Investigations · Compliance Solutions · Cyber Defense

This is an update to our 15 May 2017 e-mail regarding WannaCry ransomware, also known as WannaCry, Wry, WanaCrypt0r, Wannacrypt, Wanna Decryptor, etc.

WannaCry ransomware, which holds systems hostage for payment in Bitcoin between $300 and $600, has now affected organizations in over 100 countries around the world. While the malware spread was greatly slowed due to the activation of a "kill switch" by a security researcher, new Wannacry variants have appeared, some with "kill switches" and some without.

Because of its loading method, which makes it invulnerable to antivirus software scans, and its ability to spread laterally on a network, WannaCry is particularly dangerous. For more details on the technical indicators for WannaCry, please click here for the FBI Flash.

What Your IT Department Can Do

The defining feature of this campaign is its ability to swiftly traverse SMB connections. To mitigate this access vector:

  • Patch all Windows systems as soon as possible. Microsoft released a set of patches for all operating systems (including end of life systems) on March 14, 2017 for the vulnerability (CVE-2017-0145/MS17-010).
    • It might be particularly challenging to update and patch legacy systems and other components with embedded vulnerable operating systems due to various operational and technological factors, but these systems are also at a higher risk than others that may have more updated security features.
    • If systems cannot be patched due to operational reasons, apply "virtual patching" procedures as a stop-gap measure. These can include updating IPS/IDS and WAF signatures, whitelisting execution of applications, and hardening firewall and ACL rules.
  • Block SMB at perimeter firewalls. Doing so will prevent attackers from gaining access to your network from externally compromised devices.

To prevent other methods of initial infection and facilitate swift recovery in the event of an infection, we recommend the following:    

  • Implement all indicators of compromise (IOC) reported. If you need an updated listing, please contact us.
  • Filter emails with zipped or otherwise obfuscated attachments. A key indicator of compromise for WannaCry is malicious .zip files; blocking these files from incoming e-mails can help prevent initial infections.        
  • Regularly backup your systems and keep them separate from the primary network to provide a reliable backup option in case of an infection.                

We also recommend that your IT staff review your standard security protocols to ensure the following steps are being taken:    

  • Ensure networks are properly segregated with tightly managed network shares.        
  • Closely monitor logs and activate anomaly detection processes for user and network behavior. We recommend that you review and manage logs and alerts through a central system.
  • Develop a software update procedure that calculates the risk and critical levels and prioritize critical system updates. We recommend using a centralized patch management system to oversee all systems from a central place.        
  • Raise employee awareness to the risks of phishing (see section below on what your employees need to know).        

What You And Your Employees Need To Know

Hackers using this campaign are gaining access to their targets’ systems through remote desktop protocols (RDP) or through the exploitation of a critical Windows SMB vulnerability. To protect your organization, update any susceptible systems promptly and alert your employees about the danger of phishing e-mails. According to open source reporting, infection vectors have included e-mails containing malicious attachments and file sharing protocols built into Windows systems. Once the malware is running on a system, it utilizes this file share protocol (SMB) to infect other computers on the network.

We suggest sending an e-mail to your employees explaining WannaCry and recommending the following steps to keep their professional and personal systems safe:

  • Don’t click on any links or download any programs from unknown senders. If you doubt the validity of any e-mail, check with the sender and/or your IT staff to verify.        
  • Disable macro scripts from office files transmitted via e-mail. Only use macros in trusted documents.        
  • If any computer or system you use is infected, isolate that computer from the network immediately and report the incident to IT.       

Written by:

K2 Integrity
Contact
more
less

PUBLISH YOUR CONTENT ON JD SUPRA NOW

  • Increased visibility
  • Actionable analytics
  • Ongoing guidance

K2 Integrity on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide