WannaCryptor Ransomware hit over 40 UK hospitals, as well as over 75,000 additional workstations in 99 countries as of today, in what is turning to be the most massive ransomware campaign to date.
The ransomware, also referred to as WannaCry and Wana Decrypt0r, is delivered as a Trojan, which is downloaded when the user mistakenly clicks on a hyperlink delivered in a phishing email, Dropbox link or banner. Once the ransomware payload is executed, it encrypts files on the user’s hard drive, deletes the originals and displays the following message, requesting the user to pay a ransom in order to decrypt and recover the files.

Why is WannaCryptor ransomware spreading so quickly?
As initially reported by the Spanish CERT, and confirmed by Cyberbit researchers, the attack utilizes a Windows SMB Server vulnerability: EternalBlue/MS17-010/SMB to spread laterally. This means that after attacking one computer in the organization, the ransomware can spread independently within the network and attack additional workstations. An interesting fact is that this exploit was developed by the NSA and leaked by Shadow Brokers hacker group. Although these vulnerabilities were patched by Microsoft in March, large corporates, particularly hospitals, often lag behind in patching and therefore many of the workstations were left vulnerable, allowing the attack to spread.
What should your organization do now?

Cyberbit EDR anti-ransomware
Cyberbit’s Endpoint Detection and Response (EDR) provides ransomware detection and prevention that helps organizations detect and block ransomware attacks like WannaCryptor in real-time, before critical files were encrypted. Cyberbit EDR identifies behavioral characteristics that indicate an attack, and as a result, it detects threats that often bypass antivirus solutions.

WannaCryptor Analysis in Cyberbit EDR Graph View
Tal Morgenstern is Head of R&D, Endpoint Detection and Response Team at Cyberbit.