The WannaCry Ransomware campaign that struck users globally early last week has been thought to have started with malware-infected phishing emails, but according to Malwarebytes, that’s not the case.

Malwarebytes claims that instead of starting via phishing email, the ransomware campaign was instead initiated by scanning for vulnerable SMB ports exposed to the public internet. Hackers then used the NSA’s EternalBlue exploit to gain access to the target network and deployed the DoublePulsar backdoor to gain persistence, allowing for the installation of additional malware, like WannaCry.

Adam McNeil, a Senior Malware Intelligence Analyst at Malwarebytes explains, “Without otherwise definitive proof of the infection vector via user-provided captures or logs, and based on the user reports stating that machines were infected when employees arrived for work, we’re left to conclude that the attackers initiated an operation to hunt down vulnerable public facing SMB ports, and once located, using the newly available SMB exploits to deploy malware and propagate to other vulnerable machines within connected networks.”

Regardless of how the WannaCry campaign originated, the key takeaways for organizations to keep in mind from this global attack remain the same: organizations must regularly and in a timely fashion patch their systems, migrate to newer, supported operating systems if possible, and lastly, disable needless protocols like SMB and network segmentation.

 

Read this article on InfoSecurity Magazine

 

 

The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

Netwrix
6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)


[email protected]
 

United Kingdom

Netwrix
5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023


 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.