Breaking News

What about WannaCry 2.0? Improvements of the ransomware code would have unpredictable consequences

WannaCry made the headlines with the massive Ransomware attack that hit systems worldwide, what about an improved version?

WannaCry made the headlines with the massive Ransomware attack that hit systems worldwide.

The malware targeted organizations across 99 countries worldwide, it leverages a Windows SMB exploit to compromise unpatched OS or computers running unsupported versions of Windows OS.

The WannaCry exploits the NSA EternalBlue / DoublePulsar exploits to infect other connected Windows systems on the same network, the malware implements network warm capabilities that allow it to rapidly spread.

“The special criticality of this campaign is caused by exploiting the vulnerability described in bulletin MS17-010 using EternalBlue / DoublePulsar, which can infect other connected Windows systems on the same network that are not properly updated. Infection of a single computer can end up compromising the entire corporate network.” states the security alert issued by the CERT.

“The ransomware, a variant of WannaCry, infects the machine by encrypting all its files and, using the vulnerability mentioned in the previous paragraph that allows the execution of remote commands through Samba (SMB) and is distributed to other Windows machines in That same network.”

The DOUBLEPULSAR backdoor allows attackers to inject and execute malicious code on a target system, it is installed by leveraging the ETERNALBLUE, an SMBv1 (Server Message Block 1.0) exploit that could trigger an RCE in older versions of Windows (Windows XP to Server 2008 R2).

While investigating the threat security researcher MalwareTech discovered the presence of a “Kill Switch” in the source code of the malware that once triggered will stop its diffusion.

The expert discovered that the malware check for the presence of a specific domain to start the infection process, then MalwareTech registered the domain sinkholing the malicious code.

At this point, something changed because the attacker took its countermeasure to disable the Kill Switch.

The security researcher and malware analyst, Luciano Martins is warning of the presence of a new variant of the dreaded ransomware that has no Kill-Switch in its code.

Martins explains that is too early to speak about a WannaCry 2.0 version, anyway the experts believe that threat actors in the wild could improve the threat.

If a variant without Kill Switch will be used in a new campaign it is quite simple to speculate a situation difficult to contain due to the huge number of unpatched systems.

“The next attacks are inevitable, you can simply patch the existing samples with a hex editor and it’ll continue to spread. We will see a number of variants of this attack over the coming weeks and months so it’s important to patch hosts.” Matthew Hickey, a security expert and co-founder of Hacker House told The Hacker News.

Hundreds of thousands of unpatched systems are still exposed on the Internet and vulnerable to the WannaCry ransomware attack. This last attack leveraged exclusively on SMB exploit but a possible future attack scenario sees the threat spreading via phishing or drive-by-download attacks.

“The worm can be modified to spread other payloads not just WCry and we may see other malware campaigns piggybacking off this samples success.” Hickey added.

Below an interesting demo of WannaCry Ransomware Infection shared by Matthew, the videos were first published by the friends at The Hacker News, but I believe it is essential to share them too.

In order to mitigate the threat, users have to Install Security Patches and Disable SMBv1 as suggested the experts.

Microsoft took an unusual step to protect its customers, the company released patches for Windows Server 2003 (SP2 x64 / x86); Windows XP (SP2 x64, SP3 x86); Windows XP Embedded (SP3, x86); as well as the 32-bit and 64-bit versions of Windows 8.

The Spanish CERT has released a script for temporarily (until reboot) mitigating the infection.

UPDATE

A new variant with a new Kill Switch has been detected.

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs – WannaCry ransomware, cybercrime)

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks

Nation-state actor UAT4356 has been exploiting two zero-days in ASA and FTD firewalls since November…

47 mins ago

Hackers hijacked the eScan Antivirus update mechanism in malware campaign

A malware campaign has been exploiting the updating mechanism of the eScan antivirus to distribute…

7 hours ago

US offers a $10 million reward for information on four Iranian nationals

The Treasury Department's Office of Foreign Assets Control (OFAC) sanctioned four Iranian nationals for their…

14 hours ago

The street lights in Leicester City cannot be turned off due to a cyber attack

A cyber attack on Leicester City Council resulted in certain street lights remaining illuminated all…

15 hours ago

North Korea-linked APT groups target South Korean defense contractors

The National Police Agency in South Korea warns that North Korea-linked threat actors are targeting…

1 day ago

U.S. Gov imposed Visa restrictions on 13 individuals linked to commercial spyware activity

The U.S. Department of State imposed visa restrictions on 13 individuals allegedly linked to the…

2 days ago

This website uses cookies.