Manawatu Standard

Cyber attack: What you need to know

A global ransomware attack has crippled computers around the world. Here’s how to stay safe.

-

In a matter of days, a new form of ransomware known as Wannacrypt (or Wannacry) has crippled thousands of computers and locked up essential services including hospitals in Britain, Fedex in the United States and Telefonica in Spain.

Using the long-establishe­d strategy of encrypting a computer’s contents and then demanding a payment for the decryption key (in this case about NZ$430 worth of Bitcoin), Wannacrypt is notable for the incredible speed with which it has spread and the high-profile targets it has hit.

Why did this ransomware spread so quickly?

Ordinarily ransomware is spread in the same way as other malware: Users are asked to click a link in an email or website to unknowingl­y install the software, or computers are scanned for potential vulnerabil­ities that the software can use to slip in.

The exploit used by Wannacrypt, however, is a special case. In January a hacking group calling itself The Shadow Brokers listed for sale a series of tools it claimed to have stolen from the US National Security Agency (NSA).

It was claimed these included ‘‘zero day’’ exploits for Windows, meaning exploits that the NSA knew about that Microsoft did not.

Once these exploits were in the hands of criminals, it was only a matter of time before an attack was developed.

Last month The Shadow Brokers dumped the tools publicly, and among them was the exact exploit that Wannacrypt is now using. Microsoft had apparently been informed of the exploit sometime previously, as it released security updates to combat it in March, but any computer not up to date is potentiall­y at risk.

The way Wannacrypt spreads puts businesses at greater risk than individual­s, as it uses a protocol called server message block (SMB), which Windows uses to connect machines to file systems over a network.

This was seen in practice when the software got into Britain’s National Health Service system and began to spread to the machines of hospitals and GPS.

An early report from Cisco Talos suggests some affected organisati­ons were not only behind on security updates but were also exposing themselves unnecessar­ily by having their machines’ SMB ports open to the public internet.

How do I make sure my computer is not at risk?

If your computer is running Windows 10, you’re safe from this ransomware. The particular vulnerabil­ity Wannacrypt targets only exists in older versions of Windows.

If you’re running Windows 8.1, Windows 7 or Windows Vista and you have automatic updates enabled, your computer will have downloaded protection against this vulnerabil­ity in March.

Ditto for enterprise machines running Windows Server 2016, 2012 R2, 2012, 2008 R2 or 2008.

If for some reason you have updates turned off, you should find and install this software immediatel­y. The one you’re looking for is called MS17-010.

Other Windows operating systems are no longer supported and are, generally speaking, dangerous to run in an online context. Something like Windows XP, for example, has been unsupporte­d for years and has many vulnerabil­ities for cybercrimi­nals to exploit. In this particular case, Microsoft has made software available that can protect machines using these unsupporte­d systems.

Businesses that for whatever reason are unable to install the updates can prevent the software from spreading to their systems by temporaril­y shutting down all SMB protocols.

Anything else I should do?

Security expert Troy Hunt says the ransomware’s unpreceden­ted impact only reinforces what the security community has been advising for years.

Individual­s should use the newest operating system they can and just leave Windows Update enabled, in order to get protection against exploits like this, he says.

‘‘The eternal problem is that for individual­s, there’s often the attitude of, ‘Well, it works fine, why should I change it?’ And this is enormously dangerous.’’

The biggest lesson, though, is for organisati­ons and businesses. Upgrading operating systems and software can be costly and difficult at a large scale, especially when upgrades can conflict with specialise­d software that organisati­ons rely on.

Yet businesses need to budget for the cost of keeping up to date, and put resources behind making sure they follow industry-standard security hygiene practices such as restrictin­g access to important files and processes from outside.

‘‘Organisati­ons need to be proactive in monitoring for, testing and rolling out these patches. It’s not fun, it costs money and it can still break other dependenci­es, but the alternativ­e is quite possibly ending up like the NHS or even worse. Bottom line is that it’s an essential part of running a desktop environmen­t in a modern business,’’ Hunt says.

And, as always, a comprehens­ive backup strategy doesn’t hurt. –Fairfax NZ

 ?? PHOTO: MYTCHALL BRANSGROVE/FAIRFAX NZ ?? The way Wannacrypt spreads puts businesses at greater risk than individual­s.
PHOTO: MYTCHALL BRANSGROVE/FAIRFAX NZ The way Wannacrypt spreads puts businesses at greater risk than individual­s.

Newspapers in English

Newspapers from New Zealand