How One Security Reseacher Stopped WannaCry Ransomware Attack

The expert added that the standard model was to search for expired command and control (C2) domains belonging to botnets and redirect them to sinkholes (servers designed to capture malicious traffic rather than allowing it to reach victims).

This allows them to gather data on the geographic distribution and scale of the attack which can then be used to protect users and inform authorities.

It is also standard practice to reverse engineer the code to check for vulnerabilities that could potentially be used to takeover the malware and the botnet via a registered domain.

Ongoing threat

However by registering the domain, the MalwareTech had done all three. Essentially the malware had a piece of code that meant it would cease if the domain in question was active.

The researcher said it took a while for them to realise the botnet had been disabled but doesn’t believe this was a deliberate killswitch. Instead, they speculated it was designed to stop the malware functioning in a testing environment so further analysis could not be performed.

Microsoft ended formal support for Windows XP in 2014 but several organisations have paid for extended updates because of their reliance on the aging and increasingly insecure platform.

The NHS was one of these organisations, signing a one year extension in 2014. However this was not extended in 2015 and a possible attack has long been mooted. Indeed, according to NHS Digital as many as five percent of NHS devices run Windows XP.

Microsoft rushed out an emergency patch for WannaCry, a step which it admitted was unusual. In March, the SMB exploit in questiion was fixed, but it appears the update was not applied in many parts of the NHS, while the lack of support for Windows XP meant these systems were vulnerable.

The fallout from the debacle will reopen many arguments – not least investment in cybersecurity, funding for the health service and the ongoing threat of ransomware – but MalwareTech is adamant that another assault could be on the way – as early as Monday.

All the botnet has to do to become a threat again is change the domain. So, the advice is simple: patch now. And probably stop using Windows XP.

Quiz: The triumph and the tragedy of public sector IT

Page: 1 2

Steve McCaskill

Steve McCaskill is editor of TechWeekEurope and ChannelBiz. He joined as a reporter in 2011 and covers all areas of IT, with a particular interest in telecommunications, mobile and networking, along with sports technology.

Recent Posts

Tesla To Ask Shareholders To Reinstate Elon Musk’s $56 Billion Package

Tesla shareholders to be asked to reinstate Elon Musk's $56 billion pay package, days after…

2 days ago

Telegram To Reach One Billion Users Within Year

Catching WhatsApp? Billionaire founder of Telegram claims encrypted platform will reach one billion users within…

2 days ago

Judge Dismisses Some Harm Claims Against Meta, Zuckerberg

Good news for Mark Zuckerberg as judge dismisses some claims in dozens of lawsuits alleging…

2 days ago

Google Begins Removal Of California News Ahead Of Proposed Law

Consequences of Assembly Bill 886. Google begins removing California news websites from some search results

2 days ago

Tim Cook Says Apple Considering Factory In Indonesia

CEO Tim Cook during visit to Jakarta says Apple will look into building a manufacturing…

2 days ago

Canada To Implement Digital Services Tax This Year

Introduction of digital services tax on tech firms will begin in 2024 Canadian government confirms,…

2 days ago