Outbreak of “Wanna Cry” and “Wanna Decryptor” Ransomware Affects Companies Across the Globe

Alston & Bird
Contact

On Friday, May 12, companies in countries across the globe witnessed an unprecedented malware outbreak as ransomware labeled “Wanna Cry” and “Wanna Decryptor” infected a large range of critical systems.  The malware exploits a vulnerability in older versions of Microsoft’s Windows, locks the systems it infects, and threatens to delete files unless a bitcoin ransom is paid.

What happened?

An attacker or group of attackers unleashed a wave of ransomware infections beginning on Friday, May 12.  More so than previous attacks, this outbreak resulted in substantial disruption to regular operations.  As has been widely reported, health providers were forced to cancel or delay important treatments, factories were forced to cease work, and many computer systems were disconnected from the internet as a precautionary measure.  The malware also spread quickly and infected systems in a large majority of countries around the world.  According to various news outlets, the attacks have so far affected approximately 200,000 computers in more than 150 countries.  The United States, spared the worst of the outbreak up to this point due to the actions of a British security researcher, may experience an acceleration of infection as the attackers make adjustments.

Why were the attacks so effective?

These variants of ransomware were able to spread quickly and infect a large range of systems by taking advantage of a vulnerability in older versions of Microsoft’s Windows operating system.  This flaw, first discovered by the National Security Agency, was publicly disclosed by a hacker collective in April.  Microsoft previously released a patch through Windows Update that repaired this vulnerability, and following the wave of infections on May 12, Microsoft released an additional update for versions of Windows that no longer receive support through Windows Update.

What steps can be taken to protect against this wave of attacks?

Companies may consider a number of steps to protect against and respond to ransomware infections, including by patching known vulnerabilities, keeping abreast of up-to-date threat intelligence, making appropriate backups of data and systems, and maintaining effective response procedures.  Alston & Bird has previously addressed this subject in a recent Cyber Advisory written by our Cybersecurity Preparedness and Response team entitled “Is Your Company Prepared for a Ransomware Attack?” (access required).

What are regulators saying?

The Department of Health and Human Services (HHS) has already distributed two email alerts in connection with this outbreak.  First, on May 12, HHS advised the healthcare sector of the ongoing threat and encouraged healthcare providers to remain vigilant.  Second, on May 13, HHS provided updated guidance on ransomware attack vectors and recommended defense mechanisms.  US-CERT also issued an alert with technical details and analysis of these recent variants of ransomware.  Given the scale of this outbreak, it is possible that additional government guidance will be released in the near future.

[View source.]

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations. Attorney Advertising.

© Alston & Bird

Written by:

Alston & Bird
Contact
more
less

PUBLISH YOUR CONTENT ON JD SUPRA NOW

  • Increased visibility
  • Actionable analytics
  • Ongoing guidance

Alston & Bird on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide