Ransomware identical to WannaCry was spotted on LG self-service kiosks in South Korea this week, leaving many to believe organizations may not have taken the WannaCry threat as seriously as they should have.
The LG service center kiosks were hit on Monday morning, with the state-run Korea Internet & Security Agency (KISA) investigating the infection further. While they claim they found samples of malicious code identical to that found in the WannaCry ransomware attack, further investigation is needed to confirm the exact cause.
LG has confirmed that the service center network was shut down before the ransomware had time to encrypt key files or demand a ransom payment. The affected kiosks have since had security updates applied, but security experts believe the still hadn’t patched a key Microsoft SMB vulnerability the WannaCry threat exploited.
LG is not the only one guilty of a delayed response to the uptick in ransomware attacks. New research from Tripwire found that over two-thirds of organizations are not confident they’ve made the necessary security improvements to combat attacks like WannaCry.
Ransomware is the most feared of all malware right now, and rightfully so. In order to mitigate your risk of being infected, organizations must keep and maintain an up to date system. Regularly patching systems is a must if you want to prevent ransomware or any other forms of malware from taking advantages of vulnerabilities within your system. NNT also recommends implementing the CIS Controls at a base level to help improve your current security state.
Read this article on InfoSecurity Magazine