Skip to main content

Featured Articlce

The Future of 3D Printing and Healthcare

When it comes to 3D printing, the sky is the limit. As 3D printing technology continues to advance, applications can be as far reaching as  airplane  and  automobile parts  to medical devices and even anatomically correct, biocompatible models. Although 3D printing technology is developing at a rapid pace, the technology itself is not new. It emerged in  the 1980s  as a means of creating rapid prototypes. In recent years the applications for 3D printed models have evolved with the available hardware, software, and printable materials. Evolving technology, paired with the creative and innovative minds of scientists, engineers, and physicians, has been the launching pad for developments within 3D printing technology specific to healthcare. One way 3D printing technology is poised to create better patient outcomes is in creating an anatomically and  patient-specific models  to aid in surgery and medical procedures. With the capability to 3D ...

Ransomware attack: Here’s how WannaCry became the most virulent malware since Conficker

Image result for hacker pngWannaCry a.k.a. WannaCryptor a.k.a. WCry is wreaking havoc in the digital world, particularly in Europe. At last count, this malicious bit of code has affected over 200,000 computers worldwide.
WannaCry is officially known as WanaCryptor, that’s what the malware’s developer calls it anyway. For the sake of convenience, we’ll refer to it as WCry from here on.
WCry is a kind of malware known as ransomware. Ransomware works by encrypting all the data on your computer and then demanding a ransom, usually in the form of iTunes cards or bitcoin, to decrypt your data for you.
Think of it this way, the malware enters your PC, locks up all your data in a vault and then asks you for money the key to unlock said vault.
Given the state of modern encryption standards, it’s improbable that you’ll ever be able to recover your data without the right key, which means that you have no option but to pay to get back access to your data.
WCry takes advantage of at least two Microsoft Windows vulnerabilities to spread rapidly through networks with little to no user intervention.
WCry demands a ransom of $300 in bitcoins (around Rs 19,000) and the price doubles if you don’t pay within 3 days. After 7 days, WCry claims that your data won’t be recoverable.
The source
A number of cybersecurity experts have confirmed that the US Military Intelligence agency, the NSA (National Security Agency), first discovered these exploits and deliberately refrained from disclosing them to Microsoft.

A hacker group calling itself The Shadow Brokers hacked into a section of the NSA last year and discovered a treasure trove of catalogued, undisclosed vulnerabilities and exploits. The Shadow Brokers initially tried to sell stolen exploits, but the lack of interest in the “outdated” exploits disillusioned them. The vulnerabilities were made public soon after.
Two of those vulnerabilities, code named Eternalblue and Doublespar, are allegedly being used to drive the spread of WCry.
The Eternalblue exploit affects every version of Windows since 2001’s Windows XP and was patched in March this year. Windows 10 is apparently safe from the exploit, however.
If the NSA had disclosed the vulnerability earlier, it is likely that the patch would have come sooner. There is no official word on the state of the Doublespar exploit yet, but we assume that it’s been patched. At the time the exploits were leaked, Microsoft did say that Windows wasn’t vulnerable.
WCry itself first made an appearance in March, but wasn’t much of a threat at the time. Ransomware, is, after all, not uncommon. WCry is such a big deal now because it was recently updated to exploit Eternalblue and Doublespar, making it incredibly virulent.
How does it spread?
The exact mechanism of how WCry spread or where it originated from is unknown. It’s suspected that the malware initially spread via infected attachments sent over email.
Once a PC is infected WCry executes a program that attempts to connect to an obscure website – iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com, in this case. This website acts as a kill switch. If WCry can connect to it, it ceases to function. If it can’t, it unzips a password protected file and proceeds to encrypt the data on your computer.

The website was an unregistered domain and ideally, only the hacker would know that exact address. The hacker simply has to register the domain for the attack to cease. As it turns out, a 22-year old blogger accidentally killed the first wave of WCry by finding and registering that domain. More on that later.
Using Eternalblue, the malware then starts actively querying your network and attempts to spread and the process repeats. All of this happens with no user intervention.
All encrypted files receive a .WNCRY extension. So if you have a word document titled notes.docx, it’ll be renamed to notes.docx.wncry, and you’ll know you’ve been hacked.
Each encrypted folder will contain a file with instructions for paying the hackers a sum of $300 in bitcoin. A decryption tool is also bundled, but it needs the right code, which only the hacker can provide.
Microsoft already patched the holes in its OS in March, but judging by the number of infections and the rate at which it spread, a great many users and organisations didn’t install those security updates and patches.
In its security blog, Microsoft explains that the Eternalblue exploit was designed to target Windows 7, Windows Server 2008 and earlier versions of Windows. The exploit could never target Windows 10 and hence, that OS was safe from the attack.
Users of WIndows XP are the most vulnerable, however, because this OS no longer receives security updates from Microsoft. Considering the virulence of WCry, however, Microsoft relented and released patches for Windows XP and two other defunct OS versions.
On a side note, these OS versions are still supported by Microsoft, but only select clients receive updates, and this service is paid for by those clients.
How much damage can it cause?
Ransomware like this is almost impossible to deal with. As mentioned earlier, modern encryption standards make it almost impossible to recover encrypted data without an immense amount of computing power at your disposal, and even then, the chances of recovery are slim.
If infected, your only hope is that you had a safely stored backup of all your data. Those who’re using an online storage solution like OneDrive or iCloud are not safe either. The encrypted files can get synced online, tainting all your online data as well.

If not, you either pay the hacker or find a way to live with the fact that the data is lost forever.
Physical copies of your most important data are the best backup option. This can include CD/DVD backups of your essential data.
The ransomware has brought the National Health Service (NHS) in the UK to its knees, interfered with the operation of factories, destroyed hospital records, interfered with Spain’s essential utilities and at last count, infected over 200,000 computers.
We’ve also heard reports that over 600 companies in Japan were infected and that schools and government institutions in China were shut down by the attack.
While damage to personal property is a real possibility, the real damage is being done to businesses and essential services.
It doesn’t help that government institutions have a reputation for running on outdated hardware and software. In India, for example, most ATMs (Automated Teller Machines) run on the unsupported, 15-year old Windows XP operating system.
What can I do about it?
If you’re infected, there’s nothing you can do. Either pay up or suck it up. If you’re not infected, make sure you update your system right NOW. Not over the weekend, not tomorrow, or even tonight. Start the update process right now and hope for the best. If you’re not on Windows or are using Windows 10, this is an exploit you needn’t worry about.
Take backups of your most important data and isolate if from your network. The best option would be to use physical, uneditable media like a CD or DVD.
Microsoft has issued additional patches for every single affected OS, including Windows XP, and has also updated Windows Defender, Windows’ in-built security solution, to detect and clean out WCry.
Anti-virus software makers like Kaspersky and Trend-Micro have also done their part in improving protection against this malware.
The accidental hero
Popularly dubbed the accidental hero, a 22-year old researcher and blogger who works for a threat intelligence company and identifies himself only by ‘malwaretech’, accidentally stopped the spread of WCry.
Malwaretech stumbled upon the garbled URL that was the killswitch for WCry. Discovering that it was an unregistered domain, he simply registered it for less than $11 (around Rs 700).
Unwittingly, he’d just killed the most virulent malware since Conficker.

Comments

Popular posts from this blog

The Future of 3D Printing and Healthcare

When it comes to 3D printing, the sky is the limit. As 3D printing technology continues to advance, applications can be as far reaching as  airplane  and  automobile parts  to medical devices and even anatomically correct, biocompatible models. Although 3D printing technology is developing at a rapid pace, the technology itself is not new. It emerged in  the 1980s  as a means of creating rapid prototypes. In recent years the applications for 3D printed models have evolved with the available hardware, software, and printable materials. Evolving technology, paired with the creative and innovative minds of scientists, engineers, and physicians, has been the launching pad for developments within 3D printing technology specific to healthcare. One way 3D printing technology is poised to create better patient outcomes is in creating an anatomically and  patient-specific models  to aid in surgery and medical procedures. With the capability to 3D ...

The Science Behind 4 Of The Greatest Polymers Of All Time

PMMA Applications: Lucite, dentures, aquarium windows Developed in: 1877 Polymethylmethacrylate is a very versatile polymer. If you ever see a clear plastic block, it's probably PMMA. It was first commercialized in the 1930s in Germany, and is now found anywhere one needs clear, strong material. This includes bulletproof "glass" at your favorite corner liquor store and the huge shark tanks at the Monterey Bay Aquarium. But my favorite use of PMMA is in so-called "frozen lightning" or Lichtenberg figure sculpture. Basically, put a chunk of PMMA into an electron accelerator, fire a bunch of electrons into the plastic until it's got about two million volts of charge, then touch the side of the plastic with a bit of wire and watch as bolts of lightning carve tracks inside the clear plastic. Superabsorbers Applications: Diapers Developed in: 1960s Back in the day, diapers were made from cloth. Frequently, those cloth diapers were filled with wads of n...

Virginia Tech Students Create Foldable Bike Helmets

Helmets: Something you may have hated with a passion as a child, but your parents made you wear. As adults, one could argue helmet use is pretty divided. If you head down your local bike path or along a neighborhood street, you’ll see a good number of riders not wearing their helmets. Two Virginia Tech students think that’s a problem. Co-founders David Hall and Jordan Klein started  Park & Diamond  and set out to create a safe, compact, and stylish helmet to hopefully convince people to wear them every time they bike. The interest in refining technology to prevent bike related head injuries is  incredibly personal  for the team of innovators, especially for Hall. In 2015 Hall’s younger sister was involved in a bike accident in Philadelphia and remained in a coma for four months. The bicycle crash occurred at the corner of Park Avenue and Diamond Street in Philadelphia—which is reflected in the name of their company. How Helmets Work Just like the...