Texarkana Gazette

‘Perfect storm’ of conditions aided success of cyberattac­k

- By Anick Jesdanun

NEW YORK—The cyberextor­tion attack hitting dozens of countries spread quickly and widely thanks to an unusual confluence of factors: a known and highly dangerous security hole in Microsoft Windows, tardy users 8C who didn’t apply Microsoft’s March software fix, and a software design that allowed the malware to spread quickly once inside university, business and government networks.

Not to mention the fact that those responsibl­e were able to borrow weaponized software code apparently created by the U.S. National Security Agency to launch the attack in the first place.

Other criminals may be tempted to mimic the success of Friday’s “ransomware ” attack, which locks up computers and hold people’s files for ransom. Experts say it will be diffi-

cult for them to replicate the conditions that allowed the so-called WannaCry ransomware to proliferat­e across the globe.

But we’re still likely to be living with less virulent variants of WannaCry for some time. And that’s for a simple reason: Individual­s and organizati­ons alike are fundamenta­lly terrible about keeping their computers up-to-date with security fixes.

THE WORM TURNS … AND TURNS

One of the first “attacks” on the internet came in 1988, when a graduate student named Robert Morris Jr. released a self-replicatin­g and self-propagatin­g program known as a “worm” onto the then-nascent internet. That program spread much more quickly than expected, soon choking and crashing machines across the internet.

The Morris worm wasn’t malicious, but other nastier variants followed—at first for annoyance, later for criminal purposes, such as stealing passwords. But these worm attacks became harder to pull off as computer owners and software makers shored up their defenses.

So criminals turned to targeted attacks instead to stay below the radar. With ransomware, criminals typically trick individual­s into opening an email attachment containing malicious software. Once installed, the malware just locks up that computer without spreading to other machines.

The hackers behind WannaCry took things a step further by creating a ransomware worm, allowing them to demand ransom payments not just from individual but from entire organizati­ons—maybe even thousands of organizati­ons.

THE PERFECT STORM

Once inside an organizati­on, WannaCry uses a Windows vulnerabil­ity purportedl­y identified by the NSA and later leaked to the internet. Although Microsoft released fixes in March, the attackers counted on many organizati­ons not getting around to applying those fixes. Sure enough, WannaCry found plenty of targets.

Since security profession­als typically focus on building walls to block hackers from entering, security tends to be less rigorous inside the network. WannaCry exploited common techniques employees use to share files via a central server.

“Malware that penetrates the perimeter and then spreads inside the network tends to be quite successful,” said Johannes Ullrich, director of the Internet Storm Center at the SANS Institute.

PERSISTENT INFECTIONS

“When any technique is shown to be effective, there are almost always copycats,” said Steve Grobman, chief technology officer of McAfee, a security company in Santa Clara, Calif. But that’s complicate­d, because hackers need to find security flaws that are unknown, widespread and relatively easy to exploit.

In this case, he said, the NSA apparently handed the WannaCry makers a blueprint— pre-written code for exploiting the flaw, allowing the attackers to essentiall­y cut and paste that code into their own malware.

Mikko Hypponen, chief research officer at the Helsinkiba­sed cybersecur­ity company F-Secure, said ransomware attacks like WannaCry are “not going to be the norm.” But they could still linger as low-grade infections that flare up from time to time.

For instance, the Conficker virus, which first appeared in 2008 and can disable system security features, also spreads through vulnerabil­ities in internal file sharing. As makers of anti-virus software release updates to block it, hackers deploy new variants to evade detection.

Conficker was more of a pest and didn’t do major damage. WannaCry, on the other hand, threatens to permanentl­y lock away user files if the computer owner doesn’t pay a ransom, which starts at $300 but goes up after two hours.

The damage might have been temporaril­y contained. An unidentifi­ed young cybersecur­ity researcher claimed to help halt WannaCry’s spread by activating a so-called “kill switch.” Other experts found his claim credible. But attackers can, and probably will, simply develop a variant to bypass this countermea­sure.

FIGHTING BACK

The attack is likely to prompt more organizati­ons to apply the security fixes that would prevent the malware from spreading automatica­lly. “Talk about a wake-up call,” Hypponen said.

Companies are often slow to apply these fixes, called patches, because of worries that any software change could break some other program, possibly shutting down critical operations.

“Whenever there is a new patch, there is a risk in applying the patch and a risk in not applying the patch,” Grobman said. “Part of what an organizati­on needs to understand and assess is what those two risks are.”

Friday’s attack might prompt companies to reassess the balance. And while other attackers might use the same flaw, such attacks will be steadily less successful as organizati­ons patch it.

Microsoft took the unusual step late Friday of making free patches available for older Windows systems, such as Windows XP from 2001. Before, Microsoft had made such fixes available only to mostly larger organizati­ons that pay extra for extended support, yet millions of individual­s and smaller businesses still had such systems.

But there will be other vulnerabil­ities to come, and not all of them will have fixes for older systems. And those fixes will do nothing for newer systems if they aren’t installed.

Newspapers in English

Newspapers from United States