WannaCry Ransomware Explained

  • -
WannaCry Ransomware

WannaCry Ransomware Explained

Category : Malware

WannaCry Ransomware Explained:

Are You At Risk?

You’d be hard-pressed to miss last week’s biggest headline, the WannaCry cyber-attack sent shock-waves around the globe. Home computers, businesses of all sizes, and even police departments found themselves crippled without warning.

Among the most prominent victims were many NHS hospitals in the UK, affecting up to 70,000 individual devices such as essential MRI scanners and blood-storage refrigerators. However, by the time it hit the news, it was too late – either your system was protected, or it was infected. Here’s how it all went so wrong…so fast.

 

What is WannaCry?

The WannaCry cyber-attack was a type of malware (the collective name for computer viruses & bad juju) called ‘ransomware’. Just like the name suggests, it’s actually a demand for money. Like all ransomware attacks, WannaCry encrypts your files and holds them hostage until you pay.
In this case, the price was set at $300, payable with internet currency Bitcoin, and you had 3 days to pay before it doubled. If you didn’t pay, the ransomware threatened to delete your files permanently. It’s yet unknown how much money the WannaCry hackers have earned with their latest attack, but you can be sure plenty of people have paid the ransom. Even the FBI recommends paying the ransom, especially if the ransomed files are of a sensitive nature or weren’t backed up.

 

How It Spread So Fast

WannaCry is a ‘computer worm’ that self-replicates and spreads through a vulnerability in Windows, rather than a phishing attack email that needs to be activated with a click. So far, no common trigger has been identified, as is normally the case with phishing links. WannaCry moved rapidly from system to system, spreading through the entire network, including all connected backups and storage devices. At the same time, it spread out to infect other networks, who then spread it further, and so on. Given the nature of the internet, it was everywhere within hours. Think of it like a super mutant Flu…but for computers.

 

Why Some Computers Were Safe

WannaCry could ONLY infect systems that had fallen 2 months behind in their Windows updates. This is because it was created to take advantage of a specific vulnerability in Windows, one which Microsoft patched months ago. Without that patch, the ransomware could waltz right past the firewall, past the anti-virus and directly into the system (the NHS were reportedly running Windows XP – no longer supported). Those running Windows 10 or a fully patched, recent version of Windows were completely unaffected – the virus literally had no way in.

It just goes to show the importance of staying up to date. We haven’t seen a second spike in WannaCry attacks yet, but that doesn’t mean there won’t be one. A quick update could protect you or your business from weeks of downtime and lost revenue, making attacks like this a non-issue.

With our Clever Care Maintenance Packages, one of the many things we do is ensure that your software stays up to date. Starting at just $5 a month per computer, you can have peace of mind knowing that your computer is protected. We even have Virus Protection Plans that come with FREE Virus Removals if you become infected.*

You can read more about our plans by visiting our Clever Care page


*Recovery of files encrypted by Ransomware are not covered by our Virus Protection Plans. The encryption used is nearly impossible to break in most cases.