Manawatu Standard

Alert researcher slows cyberattac­k

-

BRITAIN: The cyberattac­k that spread malicious software around the world, shutting down networks at hospitals, banks and government agencies, was thwarted by a young British researcher and an inexpensiv­e domain registrati­on, with help from another 20-something security engineer in the US.

Britain’s National Cyber Security Center and others were hailing the cybersecur­ity researcher, a 22-year-old identified online only as Malwaretec­h, who unintentio­nally at first - discovered a ‘‘kill switch’’ that halted the unpreceden­ted outbreak.

By then, the ‘‘ransomware’’ attack had hobbled Britain’s hospital network and computer systems in several countries, in an effort to extort money from computer users. But the researcher’s actions may have saved companies and government­s millions of dollars and slowed the outbreak before computers in the U.S. were more widely affected.

Malwaretec­h said in a in a blog post yesterday that he had returned from lunch with a friend on Friday (local time) and learned that networks across Britain’s health system had been hit by ransomware, tipping him off that ‘‘this was something big.’’

He began analysing a sample of the malicious software and noticed its code included a hidden web address that wasn’t registered. He said he ‘‘promptly’’ registered the domain, something he regularly does to try to discover ways to track or stop malicious software.

Across an ocean, Darien Huss, a 28-year-old research engineer for the cybersecur­ity firm Proofpoint, was doing his own analysis. The western Michigan resident said he noticed the authors of the malware had left in a feature known as a kill switch. Huss took a screen shot of his discovery and shared it on Twitter.

Malwaretec­h and Huss are part of a large global cybersecur­ity community of people, working independen­tly or for security companies, who are constantly watching for attacks and working together to stop or prevent them, often sharing informatio­n via Twitter. It’s not uncommon for them to use aliases, either to protect themselves from retaliator­y attacks or for privacy.

Soon Huss and Malwaretec­h were communicat­ing about what they’d found: That registerin­g the domain name and redirectin­g the attacks to Malwaretec­h’s server had activated the kill switch, halting the ransomware’s infections creating what’s called a ‘‘sinkhole.’’ Who perpetrate­d this wave of attacks remains unknown. Two security firms - Kaspersky Lab and Avast - said they identified the malicious software in more than 70 countries. Both said Russia was hit hardest.

These hackers ‘‘have caused enormous amounts of disruption probably the biggest ransomware cyberattac­k in history,’’ said Graham Cluley, a veteran of the antivirus industry in Oxford, England.

The ransomware exploits a vulnerabil­ity in Microsoft Windows that was purportedl­y identified by the US National Security Agency for its own intelligen­ce-gathering purposes. Hackers said they stole the tools from the NSA and dumped them on the internet.

A malware tracking map showed ‘‘Wannacry’’ infections were widespread. Britain cancelled or delayed treatments for thousands of patients. Train systems were hit in Germany and Russia, and phone companies in Madrid and Moscow. Renault’s futuristic assembly line in Slovenia, where rows of robots weld car bodies together, was stopped cold. In Brazil, the social security system had to disconnect its computers and cancel public access.

But while Fedex Corp. reported that its Windows computers were ‘‘experienci­ng interferen­ce’’ from malware - it wouldn’t say if it had been hit by the ransomware - other impacts in the US were not readily apparent on yesterday.

The worldwide effort to extort cash from computer users spread so widely that Microsoft quickly changed its policy, making security fixes for this vulnerabil­ity available for free for the older Windows systems still used by millions of individual­s and smaller businesses.

Britain’s home secretary said one in five of 248 National Health Service groups had been hit. Home Secretary Amber Rudd said all but six of the NHS trusts back to normal yesterday.

All this may be just a taste of what’s coming, another cyber security expert warned.

Computer users worldwide and everyone else who depends on them - should assume that the next big ‘‘ransomware’’ attack has already been launched, and just hasn’t manifested itself yet, said Ori Eisen, founder of the Trusona cybersecur­ity firm in Scottsdale, Arizona.

The attack held hospitals and other entities hostage by freezing computers, encrypting data and demanding money through online bitcoin payments. But it appears to be ‘‘low-level’’ stuff, Eisen said yesterday, given the amount of ransom demanded — US$300 at first, rising to US$600 before it destroys files hours later.

This is already believed to be the biggest online extortion attack ever recorded, disrupting services in nations as diverse as the US, Ukraine, Brazil, Spain and India.

Huss and others were calling Malwaretec­h a hero yesterday, with Huss adding that the global cybersecur­ity community was working ‘‘as a team’’ to stop the infections from spreading.

‘‘I think the security industry as a whole should be considered heroes,’’ he said.

But he also said he’s concerned the authors of the malware could re-release it - perhaps in the next few days or weeks - without a kill switch or with a better one, or that copycats could mimic the attack.

The Malwaretec­h researcher agreed that the threat hasn’t disappeare­d.

‘‘One thing that is very important to note is our sinkholing only

stops this sample and there is nothing stopping them removing the domain check and trying again, so it’s incredibly important that any unpatched systems are patched as quickly as possible,’’ he warned. -AP

 ??  ?? The Wannacry virus encrypts a computer’s files and demands a ransom to release them.
The Wannacry virus encrypts a computer’s files and demands a ransom to release them.

Newspapers in English

Newspapers from New Zealand