+40 728 249 680 contact@itprenori.ro

Atacul de “răscumpărare” WannaCrypt ne va face să plângem!!

În ziua de Vineri, 12.05.2017, lumea noastră a internetului a suferit un atac bine coordonat de ransomware. Acest atac a făcut ca Britain’s NHS să își oprească activitățile și cel mai grav a fost faptul ca și-au anulat operațiile programate. Pe lângă acest lucru, o rețea mare de instituții private și publice din Rusia și China au fost afectate iar restul lumii a fost încremenită și șocată de acest atac.

Cum este posibil ca un singur virus malware ce a exploatat o vulnerabilitate descoperită de NSA acum ceva timp în urmă să ofere unui grup numit Shadow Brokers posibilitatea de a provoca atât haos?

Alexander J. Urbelis
Before the malware could do damage in the United States, a lone British researcher, known as “MalwareTech,” serendipitously identified its kill switch — the registration of a domain name — while on vacation. The ease with which MalwareTech did this says a great deal about the poor state of the global information security industry, and raises several important questions.
MalwareTech analyzed the malware in a testing environment and immediately noticed the code queried an improbable Internet domain name that did not exist. Domain names often function as malware command and control centers, so MalwareTech simply bought the domain name which triggered the kill switch for WannaCrypt. This was incredibly lucky.
MalwareTech believes that the domain name was not intended as a kill switch, but rather a mechanism by which the malware itself could identify whether it was being analyzed.
If the domain name were active, the malware would assume it was a false positive from a researcher dissembling its code, and WannaCrypt was designed to frustrate such analyses by shutting itself down. The fact that only a single domain name was coded into the malware meant that registering that domain name had the effect of shutting down WannaCrypt worldwide.
In short, WannaCrypt’s creators were lazy, and the world lucked out. If WannaCrypt could be shut down so quickly and easily, why did it take so long for someone in this world to flip the kill switch, and what does this say about the state of global cyber preparedness?
First, it shows that the information security industry views cyberattacks more as a business development opportunity than as a chance to put their collective heads together to eliminate threats.
Though there are undoubtedly professionals who share data unconditionally — as MalwareTech himself did — yesterday’s events make it clear that the efforts of the information security community need greater alignment, and that the world cannot rely on a combination of serendipity and lazy coding to prevent the next attack.
Second, we must ask whether WannaCrypt was merely a test of readiness. Perhaps the kill switch existed not out of laziness but as a deliberate act, one designed to test how long it would take to shut down the attack.
On the other hand, perhaps the creators intended to gather intelligence on the extent and type of systems that could be affected by malware targeting aged operating systems like Windows XP, which developers do not regularly update or support.
Alternatively, WannaCrypt could have been intended merely to demonstrate the moral hazard of governments that catalogue software vulnerabilities but do not notify software developers. Thus, WannaCrypt illustrated exactly what could happen if these vulnerabilities fall into the wrong hands.
WannaCrypt has generated much debate about the danger of state-sponsored cyberattacks. As a staunch privacy and security advocate, I believe the inclusion of government-mandated backdoors in applications or operating systems that could allow unfettered access to personal data or activities are not only unwise but entirely misguided. But if the 2016 election has taught us anything, we cannot deny that we live in a time that requires both offensive and defensive cyber capabilities.
Similarly, we cannot deny that we should be expecting more of software behemoths like Microsoft. We live in the era of big data, where all software is tracked. In the face of a software vulnerability that may bring a portion of the world to a halt, we should expect more than the timely release of a patch.
When critical systems rely on at-risk software, it is reasonable to expect that software developers like Microsoft, not governments, become more adept at notifying at-risk parties and ensuring systems become properly patched. Long-winded blog posts, emails, and available updates are unfortunately insufficient because many customers do not receive mainstream support or may not even know they are in possession of a vulnerable system.
On April 8, 2014, Microsoft ended its support of the Windows XP operating system on which WannaCrypt relied to propagate, and yet institutions around the globe continue to use it.
The world was quite different three years ago: the Internet of Things was a nascent but growing concept. Today the IoT is a major concern.
If we do not discover greater efficiencies to combat pernicious threats like WannaCrypt, and if we countenance the creation and abandonment of insecure software, we can expect to face a far greater cascade of threats that have the potential to cause significant digital and physical damage. And next time we may not be so lucky.
Ținând cont de toate cele întâmplate, este necesar să fim mai precauți data viitoare pentru că este posibil să nu mai fim atât de norocoși.
Vă salutăm, noi IT-prenorii.