WannaCry Ransomware: Critical Controls and Must-Have Tools for Cybersecurity

Tahir
7 min readJun 29, 2024

--

In May 2017, the world faced an unprecedented cyber-attack when WannaCry ransomware spread like wildfire across 150 countries, affecting over 230,000 computers in less than a week. Exploiting a vulnerability in the Windows operating system, WannaCry encrypted users’ data and demanded a ransom in Bitcoin for decryption keys. The attack’s speed and scale caught many organizations off-guard, leading to significant disruptions and financial losses.

This article examines the impact of WannaCry, the legislative responses to ransomware, and effective controls to mitigate such threats. We also explore three major incidents involving WannaCry to illustrate its extensive damage.

1. Impact of WannaCry

Economic Losses

WannaCry inflicted billions of dollars in economic damages globally. Affected organizations faced costs related to downtime, data recovery, and ransom payments. Major companies, hospitals, and government agencies were hit, leading to operational disruptions, especially in critical infrastructure sectors.

Healthcare Sector

One of the most affected sectors was healthcare. The UK’s National Health Service (NHS) suffered severely, with approximately 19,000 appointments canceled and crucial medical procedures delayed due to locked systems. This highlighted the vulnerability of healthcare institutions to cyber-attacks, emphasizing the need for robust cybersecurity measures.

Supply Chain Disruptions

WannaCry also disrupted global supply chains. For instance, automotive manufacturers like Renault and Nissan temporarily halted production lines due to infected systems. This ripple effect demonstrated how ransomware could disrupt business continuity across various industries.

2. Legislative Responses

In the wake of WannaCry, governments and regulatory bodies worldwide took significant steps to address the growing ransomware threat:

General Data Protection Regulation (GDPR)

Implemented in May 2018, the EU’s GDPR enforces stringent data protection requirements and mandates organizations to implement adequate cybersecurity measures. Non-compliance results in heavy fines, incentivizing businesses to enhance their security protocols against threats like WannaCry.

Cybersecurity Information Sharing Act (CISA) in the US

CISA, enacted in 2015, encourages the sharing of cybersecurity threat information between the government and private sectors. Post-WannaCry, this act has been vital in promoting collaboration to preempt and mitigate ransomware attacks.

National Cyber Security Strategy

Countries like the UK and Australia have introduced national cybersecurity strategies focusing on improving resilience against cyber threats. These strategies include funding for cybersecurity research, public awareness campaigns, and initiatives to strengthen critical infrastructure.

3. Implementing Controls Against WannaCry

To safeguard against ransomware like WannaCry, organizations should implement comprehensive cybersecurity controls:

i Patch Management

Regularly updating software and applying patches is critical. WannaCry exploited a known vulnerability (EternalBlue) in older Windows versions. Timely application of Microsoft’s security patch (MS17–010) could have prevented many infections.

Regularly updating software to fix vulnerabilities is crucial. WannaCry exploited the EternalBlue vulnerability in older Windows systems, which was patched by Microsoft before the attack.

Best Practices:

  • Automate Updates: Use tools like Microsoft Windows Server Update Services (WSUS) to automate updates.
  • Patch Prioritization: Focus on critical patches first, especially those that address vulnerabilities exploited by ransomware.

ii. Network Segmentation

Description: Dividing the network into smaller segments can prevent malware from spreading across the entire organization.

Best Practices:

  • VLANs: Use Virtual Local Area Networks to isolate different segments.
  • Firewalls: Deploy internal firewalls between network segments.
  • Access Controls: Restrict access based on the principle of least privilege.

iii. Backup and Recovery

Description: Regularly backing up data ensures that critical information can be restored without paying a ransom.

Best Practices:

  • 3–2–1 Rule: Maintain three copies of data on two different media, with one stored off-site.
  • Immutable Backups: Use backup solutions that support immutable backups, preventing data alteration.

iv. Endpoint Protection

Description: Protecting individual devices from ransomware requires robust endpoint security measures.

Best Practices:

  • Anti-Malware: Deploy advanced anti-malware tools that use behavioral analysis to detect ransomware.
  • Application Whitelisting: Allow only trusted applications to run.
  • Device Control: Restrict the use of removable media and enforce encryption.

v. User Awareness and Training

Description: Educating users about ransomware and safe practices can reduce the likelihood of infections through phishing and other social engineering tactics.

Best Practices:

  • Regular Training: Conduct regular cybersecurity training sessions.
  • Phishing Simulations: Use simulated phishing attacks to test and improve user awareness.

vi. Intrusion Detection and Prevention Systems (IDPS)

Description: IDPS tools help detect and prevent malicious activities within the network.

Best Practices:

  • Signature-Based Detection: Identify known ransomware signatures.
  • Anomaly Detection: Monitor for unusual network activity.

vii. Incident Response Plan

Description: Having a well-defined incident response plan ensures that organizations can quickly and effectively respond to a ransomware attack.

Best Practices:

  • Incident Playbooks: Develop specific playbooks for ransomware incidents.
  • Regular Drills: Conduct tabletop exercises to test and refine response strategies.

4. Software and Tools to Mitigate WannaCry Ransomware

a. Patch Management Tools

Examples:

  • Microsoft Windows Server Update Services (WSUS): Automates the distribution of updates for Windows-based systems.
  • Ivanti Patch for Windows: Provides comprehensive patch management, including third-party applications.

b. Network Segmentation Tools

Examples:

  • Cisco Identity Services Engine (ISE): Enables network segmentation and access control based on user identity.
  • VMware NSX: Provides micro-segmentation and security policies within virtualized environments.

c. Backup Solutions

Examples:

  • Veeam Backup & Replication: Offers advanced backup and recovery options with ransomware protection.
  • Acronis Cyber Backup: Includes AI-based ransomware detection and recovery features.
  • Rubrik: Provides immutable backups and automated recovery for ransomware resilience.

d. Endpoint Protection Tools

Examples:

  • Symantec Endpoint Protection: Uses advanced machine learning and behavioral analysis to detect ransomware.
  • CrowdStrike Falcon: Offers real-time threat intelligence and endpoint protection against ransomware.

e. User Awareness and Training Platforms

Examples:

  • KnowBe4: Provides security awareness training and simulated phishing attacks.
  • Cofense PhishMe: Focuses on phishing defense and user training.

f. Intrusion Detection and Prevention Systems (IDPS)

Examples:

  • Snort: An open-source network intrusion detection system capable of real-time traffic analysis.
  • Suricata: An advanced IDPS with multi-threading capabilities.
  • Cisco Firepower: Offers next-generation intrusion prevention and advanced threat protection.

g. Incident Response Tools

Examples:

  • Splunk: Provides security information and event management (SIEM) capabilities for incident detection and response.
  • Cortex XSOAR: Automates incident response workflows and playbooks.
  • Carbon Black Response: Offers real-time threat hunting and incident response capabilities.

5. Major Incidents Involving WannaCry

a. National Health Service (NHS), UK

On May 12, 2017, the NHS became one of the most high-profile victims of WannaCry. The ransomware attack crippled hospital systems across England and Scotland, leading to the cancellation of thousands of appointments and the diversion of emergency patients. The attack highlighted significant shortcomings in the NHS’s cybersecurity measures and prompted a nationwide review.

On Friday 12 May 2017, a global ransomware attack, known as WannaCry, affected a wide range of countries and sectors. Although WannaCry impacted the provision of services topatients, the NHS was not a specific target. The NHS responded well to what was an unprecedented incident, with no reports of harm to patients or of patient data being compromised or stolen. In total, 1% of NHS activity was directlym affected by the WannaCry attack. 802 out of 236 hospital trusts across England were affected, which means that services were impacted even if the organisation was not infected by the virus (for instance they took their email offline to reduce the risk of infection). 595 out of 7,4545 GP practices (8%) and eight other NHS and related organisations were infected.

This disruption to patient care has made it even clearer how dependent the NHS is on information technologyand, as a result, the need for security improvements to be made across the service. The incident also highlighted areas for improvement both within individual NHS organisations and across the system as a whole. Since the attack, urgent action has been taken to tackle these challenges, building on existing significant programmes of work that have been underway since 2010 to improve cyber resilience across the health and care system. These measures include support for local organisations to upgrade from Windows XP in 20106 and 20147, and the establishment of CareCERT by NHS Digital, one of only two sector-specific cyber support services in England.Identified areas for improvement include the need for senior leadership and Board level accountability for cyber security in every health and care organisation. Local organisations must ensure effective management of their technology infrastructure, systems and services, including the adequate patching of devices and systems, ensure sufficient network security and replace unsupported software. Nationally, a new agreement with Microsoft has been signed, which includes patches for all its current Windows devices operating XP.

b. Telefonica, Spain

Telecommunications giant Telefonica was among the first major corporations impacted. WannaCry encrypted data on employee computers, disrupting internal communications and operations. Although customer services were not directly affected, the attack led to widespread panic and highlighted the vulnerability of critical infrastructure.

c. FedEx, USA

FedEx experienced significant disruptions due to WannaCry, particularly in its European operations under the TNT Express brand. The attack led to delays in package deliveries and considerable recovery costs. FedEx reported a $300 million financial impact due to the ransomware, underscoring the potential economic ramifications for global logistics providers.

Conclusion

WannaCry served as a wake-up call for organizations worldwide, underscoring the need for robust cybersecurity measures and preparedness against ransomware. Legislative frameworks have evolved to enforce stricter data protection and cybersecurity standards. By implementing effective controls such as patch management, network segmentation, backup solutions, and user training, organizations can better defend against similar threats in the future.

The lessons learned from WannaCry continue to shape global cybersecurity strategies, emphasizing a proactive approach to safeguarding digital assets in an increasingly connected world.

Lessons learned review of the WannaCry Ransomware Cyber Attack

WannaCry Malware Profile

--

--