The WannaCry Ransomware Attack
What is WannaCry
ransomware attack?
One of the most infamous global cyberattacks was the “WannaCry ransomware attack” that occurred in May 2017. The attack used a worm-like virus to exploit vulnerabilities in Microsoft Windows systems. The malware encrypted users' files and demanded ransom payments in Bitcoin to unlock them. It quickly spread across 150 countries, affecting industries ranging from healthcare to finance.
The
attack severely impacted the UK's National Health Service (NHS), where hospital
systems were locked down, resulting in delays in medical procedures and
critical patient care. In total, WannaCry affected hundreds of thousands of
computers globally. It was later discovered that North Korean hackers, linked
to the Lazarus Group, were responsible for the attack.
What
made this cybercrime particularly dangerous was the use of a leaked National
Security Agency (NSA) exploit known as "EternalBlue," which
highlighted how even government-developed tools can be weaponized in the wrong
hands. This incident underlined the critical need for regular software updates
and cybersecurity vigilance across all industries.
How
WannaCry Worked:
- Spread
Mechanism: WannaCry spread like a worm, meaning it could propagate itself
from one computer to another without user intervention.
- Encryption
and Ransom: Once it infected a system, the malware encrypted the files,
making them inaccessible to users. It displayed a ransom note demanding payment
in Bitcoin, typically around $300–$600, to decrypt the files.
- Vulnerability
Exploited: The attack leveraged the EternalBlue exploit in unpatched or
outdated Windows systems, particularly those not updated with the Microsoft
security patch issued two months before the attack.
Impact:
- Major
Organizations Affected: The most notable victim was the UK’s National
Health Service (NHS), where hospital systems were paralyzed, leading to delays
in surgeries, ambulance services, and patient care. Other victims included
FedEx, Telefónica, and many other businesses across various sectors.
-Global Impact: Over 200,000 computers were affected, and the attack caused billions in damages.
- Ransom
Demand: The malware demanded ransom in Bitcoin, reflecting the growing use
of cryptocurrency in cybercrime.
- Government
Involvement: The attack was attributed to a nation-state, raising concerns
about state-sponsored cyber warfare.
- Importance
of Updates: Many of the affected systems had not applied the available
security patch from Microsoft, underscoring the critical need for timely
software updates.
- Cyber Defence:
The attack revealed gaps in cybersecurity readiness across sectors,
highlighting the need for better preparedness against ransomware and other
forms of cyberattacks.
- State-Sponsored
Cybercrime: WannaCry raised concerns about the role of state-sponsored
hacking in global cybersecurity threats.
-Kill Switch: A cybersecurity researcher, Marcus Hutchins, accidentally found a "kill switch" in the code, halting the spread of the ransomware by registering a domain embedded in the malware’s code.
-Attribution: The attack was later attributed to North Korean hackers, specifically the Lazarus Group, which has been involved in numerous high-profile cybercrimes. The group’s aim appeared to be financial gain rather than espionage or sabotage.

