![Lead Image © Natalia Lukiyanova, 123RF.com Lead Image © Natalia Lukiyanova, 123RF.com](/var/ezflow_site/storage/images/archive/2022/70/preparing-for-cyberattacks/natalia_lukiyanova_123rf-web.png/196473-1-eng-US/Natalia_Lukiyanova_123RF-Web.png1_medium.png)
Lead Image © Natalia Lukiyanova, 123RF.com
Preparing for cyberattacks
The Enemy in My Web
The number of cyberattacks with ransomware has been rising steadily for several years. WannaCry ransomware attacks caused quite a stir in 2017. Hundreds of thousands of Windows systems were infected through a vulnerability in Microsoft's SMB protocol, and the data on these systems were encrypted. The malware used a US National Security Agency (NSA) exploit named EternalBlue published for propagation by a hacker group. Although Microsoft released a patch to close this gap before the WannaCry outbreak, many systems had not yet been updated and were therefore still vulnerable (Figure 1).
![](/var/ezflow_site/storage/images/archive/2022/70/preparing-for-cyberattacks/figure-1/196477-1-eng-US/Figure-11_large.png)
More or less by accident, British security researcher Marcus Hutchins found a way to disable WannaCry. The malware checks for the existence of a special domain before encrypting files. If the domain is not accessible, WannaCry starts encrypting. After the registration of this domain in the worldwide DNS system, further propagation was temporarily stopped after just four days. By then, Bitcoin payments equivalent to several hundred thousand dollars had already been transferred to the attackers' wallet.
The encryption of more than 30 servers on the computer network of University
...Buy this article as PDF
(incl. VAT)