A display panel with a ransomware error is seen at the main railway station in Chemnitz, Germany, on Friday. (AP Photo)

A display panel with a ransomware error is seen at the main railway station in Chemnitz, Germany, on Friday. (AP Photo)

‘Perfect storm’ helped huge ransomware attack succeed

By Anick Jesdanun, Associated Press

NEW YORK — The cyberextortion attack hitting dozens of countries spread quickly and widely thanks to an unusual confluence of factors: a known and highly dangerous security hole in Microsoft Windows, tardy users who didn’t apply Microsoft’s March software fix, and a software design that allowed the malware to spread quickly once inside university, business and government networks.

Not to mention the fact that those responsible were able to borrow weaponized software code apparently created by the U.S. National Security Agency to launch the attack in the first place.

A malware tracking map showed “WannaCry” infections popping up around the world. Britain canceled or delayed treatments for thousands of patients, even people with cancer. Train systems were hit in Germany and Russia, and phone companies in Madrid and Moscow. Renault’s futuristic assembly line in Slovenia, where rows of robots weld car bodies together, was stopped cold.

ADVERTISEMENT
0 seconds of 0 secondsVolume 0%
Press shift question mark to access a list of keyboard shortcuts
00:00
00:00
00:00
 

In Brazil, the social security system had to disconnect its computers and cancel public access. The state-owned oil company Petrobras and Brazil’s Foreign Ministry also disconnected computers as a precautionary measure, and court systems went down, too.

Other criminals may be tempted to mimic the success of Friday’s “ransomware ” attack, which locks up computers and hold people’s files for ransom. Experts say it will be difficult for them to replicate the conditions that allowed the so-called WannaCry ransomware to proliferate across the globe.

But we’re still likely to be living with less virulent variants of WannaCry for some time. And that’s for a simple reason: Individuals and organizations alike are fundamentally terrible about keeping their computers up-to-date with security fixes.

The worm turns … and turns

One of the first “attacks” on the internet came in 1988, when a graduate student named Robert Morris Jr. released a self-replicating and self-propagating program known as a “worm” onto the then-nascent internet. That program spread much more quickly than expected, soon choking and crashing machines across the internet.

The Morris worm wasn’t malicious, but other nastier variants followed — at first for annoyance, later for criminal purposes, such as stealing passwords. But these worm attacks became harder to pull off as computer owners and software makers shored up their defenses.

So criminals turned to targeted attacks instead to stay below the radar. With ransomware, criminals typically trick individuals into opening an email attachment containing malicious software. Once installed, the malware just locks up that computer without spreading to other machines.

The hackers behind WannaCry took things a step further by creating a ransomware worm, allowing them to demand ransom payments not just from individual but from entire organizations — maybe even thousands of organizations.

The perfect storm

Once inside an organization, WannaCry uses a Windows vulnerability purportedly identified by the NSA and later leaked to the internet. Although Microsoft released fixes in March, the attackers counted on many organizations not getting around to applying those fixes. Sure enough, WannaCry found plenty of targets.

Since security professionals typically focus on building walls to block hackers from entering, security tends to be less rigorous inside the network. WannaCry exploited common techniques employees use to share files via a central server.

“Malware that penetrates the perimeter and then spreads inside the network tends to be quite successful,” said Johannes Ullrich, director of the Internet Storm Center at the SANS Institute.

Persistent infections

“When any technique is shown to be effective, there are almost always copycats,” said Steve Grobman, chief technology officer of McAfee, a security company in Santa Clara, California. But that’s complicated, because hackers need to find security flaws that are unknown, widespread and relatively easy to exploit.

In this case, he said, the NSA apparently handed the WannaCry makers a blueprint — pre-written code for exploiting the flaw, allowing the attackers to essentially cut and paste that code into their own malware.

Mikko Hypponen, chief research officer at the Helsinki-based cybersecurity company F-Secure, said ransomware attacks like WannaCry are “not going to be the norm.” But they could still linger as low-grade infections that flare up from time to time.

For instance, the Conficker virus, which first appeared in 2008 and can disable system security features, also spreads through vulnerabilities in internal file sharing. As makers of anti-virus software release updates to block it, hackers deploy new variants to evade detection.

Conficker was more of a pest and didn’t do major damage. WannaCry, on the other hand, threatens to permanently lock away user files if the computer owner doesn’t pay a ransom, which starts at $300 but goes up after two hours.

The damage might have been temporarily contained. An unidentified young cybersecurity researcher claimed to help halt WannaCry’s spread by activating a so-called “kill switch.” Other experts found his claim credible. But attackers can, and probably will, simply develop a variant to bypass this countermeasure.

Fighting back

The attack is likely to prompt more organizations to apply the security fixes that would prevent the malware from spreading automatically. “Talk about a wake-up call,” Hypponen said.

Companies are often slow to apply these fixes, called patches, because of worries that any software change could break some other program, possibly shutting down critical operations.

“Whenever there is a new patch, there is a risk in applying the patch and a risk in not applying the patch,” Grobman said. “Part of what an organization needs to understand and assess is what those two risks are.”

Friday’s attack might prompt companies to reassess the balance. And while other attackers might use the same flaw, such attacks will be steadily less successful as organizations patch it.

Microsoft took the unusual step late Friday of making free patches available for older Windows systems, such as Windows XP from 2001. Before, Microsoft had made such fixes available only to mostly larger organizations that pay extra for extended support, yet millions of individuals and smaller businesses still had such systems.

But there will be other vulnerabilities to come, and not all of them will have fixes for older systems. And those fixes will do nothing for newer systems if they aren’t installed.

Talk to us

> Give us your news tips.

> Send us a letter to the editor.

> More Herald contact information.

More in Local News

Cars drive along Cathcart Way next to the site of the proposed Eastview Village development that borders Little Cedars Elementary on Wednesday, May 7, 2025 in unincorporated Snohomish, Washington. (Olivia Vanni / The Herald)
Former engineer: Snohomish County rushed plans for Eastview development

David Irwin cited red flags from the developers. After he resigned, the county approved the development that’s now stalled with an appeal

Outside of the Madrona School on Monday, Aug. 26, 2024 in Edmonds, Washington. (Olivia Vanni / The Herald)
Sewer district notifies Edmonds schools of intent to sue

The letter of intent alleges the school district has failed to address long-standing “water pollution issues” at Madrona K-8 School.

Everett
Man stabbed in face outside Everett IHOP, may lose eye

Police say the suspect fled in the victim’s car, leading officers on a 6-mile chase before his arrest.

A person walks up 20th Street Southeast to look at the damage that closed the road on Wednesday, Nov. 20, 2024 in Lake Stevens, Washington. (Olivia Vanni / The Herald)
WA delegation urges Trump to reconsider request for bomb cyclone aid

The Washington state congressional delegation urged President Donald Trump on… Continue reading

Aaron Weinstock uses an x-ray machine toy inside the Imagine Children Museum on Tuesday, Dec. 3, 2024 in Everett, Washington. (Olivia Vanni / The Herald)
Imagine Children’s Museum $250k grant reinstated following federal court order

The federal grant supports a program that brings free science lessons to children throughout rural Snohomish County.

Snohomish County 911 Executive Director Kurt Mills talks about the improvements made in the new call center space during a tour of the building on Tuesday, May 20, 2025 in Everett, Washington. (Olivia Vanni / The Herald)
New 911 center in Everett built to survive disaster

The $67.5 million facility brings all emergency staff under one roof with seismic upgrades, wellness features and space to expand.

Everett
Five arrested in connection with Everett toddler’s 2024 overdose death

More than a year after 13-month-old died, Everett police make arrests in overdose case.

Madison Family Shelter Family Support Specialist Dan Blizard talks about one of the pallet homes on Monday, May 19, 2025 in Everett, Washington. (Olivia Vanni / The Herald)
Madison Family Shelter reopens after hiatus

The Pallet shelter village, formerly Faith Family Village, provides housing for up to eight families for 90 days.

Help Washington manage European green crabs with citizen science events

Washington State University and Washington Sea Grant will hold a training at Willis Tucker Park on June 2.

Emilee Swenson pulls kids around in a wagon at HopeWorks' child care center Tomorrow’s Hope, a job training program for people interested in child care, on Tuesday, Sept. 7, 2021 in Everett, Washington. HopeWorks is one of the organizations reciving funding from the ARPA $4.3 million stipend. (Andy Bronson / The Herald)
Early learning group presents countywide survey findings

The survey highlighted the largest issues parents and providers are facing amid the county’s child care crisis.

Brian Murril, who started at Liberty Elementary as a kindergartner in 1963, looks for his yearbook photograph during an open house for the public to walk through the school before its closing on Thursday, May 29, 2025 in Marysville, Washington. (Olivia Vanni / The Herald)
Locals say goodbye to Marysville school after 74 years

Liberty Elementary is one of two schools the Marysville School District is closing later this year to save costs.

U.S. Sen. Patty Murray speaks at a round table discussion with multiple Snohomish County agencies about the Trump administrator restricting homelessness assistance funding on Thursday, May 29, 2025 in Everett, Washington. (Olivia Vanni / The Herald)
Sen. Murray hears from county homelessness assistance providers

In early May, Snohomish County sued the Trump administration for putting unlawful conditions on $16.7M in grant funding.

Support local journalism

If you value local news, make a gift now to support the trusted journalism you get in The Daily Herald. Donations processed in this system are not tax deductible.