Daily Times (Primos, PA)

Experts: Conditions behind cyberattac­k may be hard to mimic

- By Anick Jesdanun

NEW YORK » The cyberextor­tion attack hitting dozens of countries spread quickly and widely thanks to an unusual confluence of factors: a known and highly dangerous security hole in Microsoft Windows, tardy users who didn’t apply Microsoft’s March software fix, and a software design that allowed the malware to spread quickly once inside university, business and government networks.

Not to mention the fact that those responsibl­e were able to borrow weaponized software code apparently created by the U.S. National Security Agency to launch the attack in the first place.

Other criminals may be tempted to mimic the success of Friday’s “ransomware “attack, which locks up computers and hold people’s files for ransom. Experts say it will be difficult for them to replicate the conditions that allowed the so-called WannaCry ransomware to proliferat­e across the globe.

But we’re still likely to be living with less virulent variants of WannaCry for some time. And that’s for a simple reason: Individual­s and organizati­ons alike are fundamenta­lly terrible about keeping their computers up-todate with security fixes.

THE WORM TURNS ... AND TURNS

One of the first “attacks” on the internet came in 1988, when a graduate student named Robert Morris Jr. released a self-replicatin­g and self-propagatin­g program known as a “worm” onto the then-nascent internet. That program spread much more quickly than expected, soon choking and crashing machines across the internet.

The Morris worm wasn’t malicious, but other nastier variants followed — at first for annoyance, later for criminal purposes, such as stealing passwords. But these worm attacks became harder to pull off as computer owners and software makers shored up their defenses.

So criminals turned to targeted attacks instead to stay below the radar. With ransomware, criminals typically trick individual­s into opening an email attachment containing malicious software. Once installed, the malware just locks up that computer without spreading to other machines.

The hackers behind WannaCry took things a step further by creating a ransomware worm, allowing them to demand ransom payments not just from individual but from entire organizati­ons — maybe even thousands of organizati­ons.

THE PERFECT STORM

Once inside an organizati­on, WannaCry uses a Windows vulnerabil­ity purportedl­y identified by the NSA and later leaked to the internet. Although Microsoft released fixes in March, the attackers counted on many organizati­ons not getting around to applying those fixes. Sure enough, WannaCry found plenty of targets.

Since security profession­als typically focus on building walls to block hackers from entering, security tends to be less rigorous inside the network. WannaCry exploited common techniques employees use to share files via a central server.

“Malware that penetrates the perimeter and then spreads inside the network tends to be quite successful,” said Johannes Ullrich, director of the Internet Storm Center at the SANS Institute.

PERSISTENT INFECTIONS

“When any technique is shown to be effective, there are almost always copycats,” said Steve Grobman, chief technology officer of McAfee, a security company in Santa Clara, California. But that’s complicate­d, because hackers need to find security flaws that are unknown, widespread and relatively easy to exploit.

In this case, he said, the NSA apparently handed the WannaCry makers a blueprint — pre-written code for exploiting the flaw, allowing the attackers to essentiall­y cut and paste that code into their own malware.

Mikko Hypponen, chief research officer at the Helsinkiba­sed cybersecur­ity company FSecure, said ransomware attacks like WannaCry are “not going to be the norm.” But they could still linger as low-grade infections that flare up from time to time.

For instance, the Conficker virus, which first appeared in 2008 and can disable system security features, also spreads through vulnerabil­ities in internal file sharing. As makers of anti-virus software release updates to block it, hackers deploy new variants to evade detection.

Conficker was more and didn’t do major of a pest damage. WannaCry, on the other hand, threatens to permanentl­y lock away user files if the computer owner doesn’t pay a ransom, which starts at $300 but goes up after two hours.

The damage might have been temporaril­y contained. An unidentifi­ed young cybersecur­ity researcher claimed to help halt WannaCry’s spread by activating a so-called “kill switch.” Other experts found his claim credible. But attackers can, and probably will, simply develop a variant to bypass this countermea­sure.

 ?? MICHEL EULER — THE ASSOCIATED PRESS FILE ?? This file photo shows the Microsoft logo in Issy-les-Moulineaux, outside Paris, France. The cyberextor­tion attack hitting dozens of countries was a “perfect storm” of sorts. It combined a known and highly dangerous security hole in Microsoft Windows,...
MICHEL EULER — THE ASSOCIATED PRESS FILE This file photo shows the Microsoft logo in Issy-les-Moulineaux, outside Paris, France. The cyberextor­tion attack hitting dozens of countries was a “perfect storm” of sorts. It combined a known and highly dangerous security hole in Microsoft Windows,...

Newspapers in English

Newspapers from United States