Menu
NZ battens down the hatches as global ransomware attack spreads

NZ battens down the hatches as global ransomware attack spreads

“Biggest ransomware outbreak in history” hits 99 countries across four continents.

According to Meyers, early analysis of the worm is that it is taking advantage of a very recent Microsoft Windows exploit called EternalBlue, which is the enabler for how files get shared.

“Swift action to patch against this update is critical,” Meyers added. “Whilst ensuring that back-up data files are disconnected from the core network, as this ransomware has the potential to encrypt back-up files.”

Early reports show the malware originating in Europe and impacting healthcare organisations, hospitals, surgeries, telecommunication systems as well as gas and electricity utilities.

“The group behind the attack does not appear to be picky about the nation or sector it is targeting,” Meyers added.

After WannaCry encrypts data files and asks users to pay a US$300 ransom in Bitcoins, the ransom note indicates that the payment amount will be doubled after three days.

This is what the victim’s wallpaper is changed to following the breach (Image - Avast Software)
This is what the victim’s wallpaper is changed to following the breach (Image - Avast Software)

If payment is not made after seven days, the encrypted files will be deleted.

“WannaCry has the ability to spread itself within corporate networks, without user interaction, by exploiting a known vulnerability in Microsoft Windows,” a Symantec Security Response statement read.

“Computers which do not have the latest Windows security updates applied are at risk of infection.”

While the breaches appear to be linked, researchers believe it may not be a coordinated attack on specific targets, a theory backed up by UK Prime Minister Theresa May.

“This is not targeted at the NHS, it’s an international attack and a number of countries and organisations have been affected,” May said on 12 May.

Increased activity of the ransomware strain was first globally reported at 8am Central European Time (CET) on 12 May, with attacks then rapidly increasing across the world during the next 24 hours.

“We saw the first version of WanaCrypt0r in February and now the ransomware is available in 28 different languages, from languages like Bulgarian to Vietnamese,” Avast Software threat intelligence analyst Jakub Kroustek said.

"The ransomware changes the affected file extension names to “.WNCRY”, so an infected file will look something like: original_name_of_file.jpg.WNCRY, for example. The encrypted files are also marked by the “WANACRY!” string at the beginning of the file.”

According to Kroustek, the ransomware drops the following ransom notes in a text file and after demanding the bitcoin ransom, the victim’s wallpaper is changed.

“This attack once again proves that ransomware is a powerful weapon that can be used against consumers and businesses alike,” Kroustek said.

“Ransomware becomes particularly nasty when it infects institutions like hospitals, where it can put people’s lives in danger.”

A security researcher may have helped stop the spread of the ransomware, through the deployment of a kill switch solution. The kill switch appears to work like this - if the malicious program can’t connect to the domain, it’ll proceed with the infection. If the connection succeeds, the program will stop the attack.
(Updated - 13 May at 2:18pm)


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags governmentmalwareransomwarecyber security

Featured

Slideshows

The making of an MSSP: a blueprint for growth in NZ

The making of an MSSP: a blueprint for growth in NZ

Partners are actively building out security practices and services to match, yet remain challenged by a lack of guidance in the market. This exclusive Reseller News Roundtable - in association with Sophos - assessed the making of an MSSP, outlining the blueprint for growth and how partners can differentiate in New Zealand.

The making of an MSSP: a blueprint for growth in NZ
Reseller News Platinum Club celebrates leading partners in 2018

Reseller News Platinum Club celebrates leading partners in 2018

The leading players of the New Zealand channel came together to celebrate a year of achievement at the inaugural Reseller News Platinum Club lunch in Auckland. Following the Reseller News Innovation Awards, Platinum Club provides a platform to showcase the top performing partners and start-ups of the past 12 months, with more than ​​50 organisations in the spotlight.​​​

Reseller News Platinum Club celebrates leading partners in 2018
Meet the top performing HP partners in NZ

Meet the top performing HP partners in NZ

HP has honoured its leading partners in New Zealand during 2018, following 12 months of growth through the local channel. Unveiled during the fourth running of the ceremony in Auckland, the awards recognise and celebrate excellence, growth, consistency and engagement of standout Kiwi partners.

Meet the top performing HP partners in NZ
Show Comments