{"id":1342,"date":"2017-05-16T11:08:03","date_gmt":"2017-05-16T11:08:03","guid":{"rendered":"https:\/\/www.varutra.com\/blog\/?p=1342"},"modified":"2022-12-02T16:27:43","modified_gmt":"2022-12-02T10:57:43","slug":"threat-advisory-report-on-ransomware-wannacry-critical-severity","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/threat-advisory-report-on-ransomware-wannacry-critical-severity\/","title":{"rendered":"Threat Advisory Report on WannaCry Ransomware (Critical Severity)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2017\/05\/threat-Advisory-Copy-1024x614.png\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"threat Advisory Copy - Varutra Consulting\"><br \/>\n<a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/ransomeware-bit-coin.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-1376\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/ransomeware-bit-coin.png\" alt=\"WannaCry Ransomware\" width=\"385\" height=\"218\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/ransomeware-bit-coin.png 1135w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/ransomeware-bit-coin-300x170.png 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/ransomeware-bit-coin-1024x579.png 1024w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/ransomeware-bit-coin-768x434.png 768w\" sizes=\"(max-width: 385px) 100vw, 385px\" \/><\/a><\/p>\n<p>Here we will discuss Threat Advisory Report on WannaCry Ransomware (Critical Severity).<\/p>\n<h3><span style=\"color: #ff0000\"><strong>1. Introduction<br \/>\n<\/strong><\/span><\/h3>\n<p><span style=\"color: #ff0000\"><strong><br \/>\n<\/strong><\/span>On Friday, May 12, countless organizations around the world began fending off attacks from a ransomware strain variously known as WannaCrypt, WanaDecrypt and Wanna.Cry.<\/p>\n<p>Security researchers found \u201cWannaCry\u201d or \u201cWannaDecryptor\u201d; a type of ransomware which spreads from system to system silently and remains invisible to users until it unveils itself and then warns users that all their files have been encrypted with a key known only to the attacker and that they will be locked out until they pay to an anonymous party using the cryptocurrency Bitcoin.<\/p>\n<p>Ransomware encrypts a victim\u2019s documents, images, music and other files unless the victim pays for a key to unlock them.<\/p>\n<p>Wana Decrypt0r triggered security alerts for ETERNALBLUE, an alleged NSA exploit. ETERNALBLUE works by exploiting a vulnerability in the SMBv1 protocol to get a foothold on vulnerable machines connected online. Microsoft patched the flaw in MS17-010, released in March, but there are high chances that all Windows PC owners have applied the security update.<\/p>\n<p>On Friday, at least 16 hospitals in the United Kingdom were forced to divert emergency patients after computer systems there were infected with Wanna. According to multiple stories in the British media, approximately 90 percent of care facilities in the U.K.\u2019s National Health Service are still using Windows XP \u2013 a 16-year-old operating system.<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #ff0000\"><strong>2. Attack Scenario<\/strong><\/span><\/h3>\n<p>The initial infection vector of WannaCrypt 2.0 is not confirmed. It is possible that the initial vector is spam with malicious attachments (.pdf, .hta, and macro embedded MS Office files) commonly used in other ransomware campaigns.<\/p>\n<p>Once WannaCry 2.0 achieves a foothold, the ransomware infects other machines by leveraging a remote command execution vulnerability of Server Message Block (SMB). It is confirmed to exploit at least one publicly disclosed SMB vulnerability &#8211; CVE 2017-0143 also referred to as &#8220;EternalBlue&#8221; &#8211; which was released by a group called ShadowBrokers in April 2017. Using arbitrary code execution privileges, the ransomware installs itself to the machine, then proceeds to encrypt a wide array of files.<\/p>\n<p>Files are encrypted with the .WNCRY file extension added to them. The ransomware also downloads and installs TOR, with all dependencies, onto the infected machine, and uses this service to reach out to one of at least six .onion domains. The ransomware drops a ransom note named @Please_Read_Me@.txt; it also adds a lock screen, named &#8220;WanaCrypt0r 2.0\u201d<\/p>\n<p>At the time of reporting, the malware was requesting $300 USD in BitCoins, though this amount was later increased to $600. The Bitcoin wallets associated with the activity had received approximately 500 ransom payments, estimated to be worth over $150,000.<\/p>\n<p>Additionally, reports indicate the ransomware may have increased its payment demands from $300 to $600, indicating the actors have some level of control over the demanded amount and are increasing the cost of decryption, likely due to the success of the malware.<\/p>\n<p>The ransomware uses a unique encryption key for each binary placed onto a computer, but since the ransomware uses asymmetric RSA encryption even having the encryption key will not allow for convenient decryption.<\/p>\n<p>Upon infection, the following files are created:<\/p>\n<p>%Temp%\\b.wnry<\/p>\n<p>%Temp%\\c.wnry<\/p>\n<p>%Temp%\\m.wnry<\/p>\n<p>%Temp%\\r.wnry<\/p>\n<p>%Temp%\\t.wnry<\/p>\n<p>%Temp%\\u.wnry<\/p>\n<p>%Temp%\\m.vbs<\/p>\n<p>%Temp%\\taskdl.exe<\/p>\n<p>C:\\ProgramData\\taskse.exe<\/p>\n<p>%Temp%\\[14 random digits].bat<\/p>\n<p>The file c.wry contains information needed by the malware to further the infection and communication with its Command and control server.<\/p>\n<p><a href=\"mailto:wanna18@hotmail[.]com\">wanna18@hotmail[.]com<\/a><\/p>\n<p>13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94<\/p>\n<p>sqjolphimrr7jqw6[.]onion<\/p>\n<p><a href=\"https:\/\/www.dropbox[.]com\/s\/deh8s52zazlyy94\/t.zip?dl=1\">https:\/\/www.dropbox[.]com\/s\/deh8s52zazlyy94\/t.zip?dl=1<\/a><\/p>\n<p>win32-0.2.8.11.zip<\/p>\n<p><a href=\"https:\/\/dist.torproject[.]org\/torbrowser\/6.5.1\/tor-win32-0.2.9.10.zip\">https:\/\/dist.torproject[.]org\/torbrowser\/6.5.1\/tor-win32-0.2.9.10.zip<\/a><\/p>\n<p><a href=\"https:\/\/www.dropbox[.]com\/s\/c1gn29iy8erh1ks\/m.rar?dl=1\">https:\/\/www.dropbox[.]com\/s\/c1gn29iy8erh1ks\/m.rar?dl=1<\/a><\/p>\n<p>Adding the following registry entry for persistence:<\/p>\n<p>HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run \/v &#8220;&#8221; \/t REG_SZ \/d<\/p>\n<p>&#8220;\\&#8221;C:\\Users\\\\AppData\\Local\\Temp\\tasksche.exe\\&#8221;&#8221; \/f<\/p>\n<p>It also drops the ransom file named @Please_Read_Me@.txt and the decryptor file named @WanaDecryptor@.exe, as shown below:<\/p>\n<p>WannaCrypt0r 2.0 uses TOR hidden services for command and control, dropping and installing a fully functional version of TOR with all necessary components onto an infected machine. The TOR service reaches out to one of a number of .onion domains, including:<\/p>\n<ul>\n<li>gx7ekbenv2riucmf[.]onion<\/li>\n<li>57g7spgrzlojinas[.]onion<\/li>\n<li>Xxlvbrloxvriy2c5[.]onion<\/li>\n<li>76jdd2ir2embyv47[.]onion<\/li>\n<li>cwwnhwhlz52maqm7[.]onion<\/li>\n<li>sqjolphimrr7jqw6[.]onion<\/li>\n<\/ul>\n<p>The following file extensions have been observed affected by this malware:<\/p>\n<p>.der .slk .odb .jsp .3g2 .zip .edb .docm.pfx .wb2 .frm .php .flv .rar .potm .docb.key .odp .myd .asp .wma .tgz .potx .jpg.crt .otp .myi .java .mid .tar .ppam .jpeg.csr .sxd .ibd .jar .m3u .bak .ppsx .snt.p12 .std .mdf .class .m4u .tbk .ppsm .onetoc2.pem .uop .ldf .mp3 .djvu .bz2 .pps .dwg.odt .odg .sln .wav .svg .PAQ .pot .pdf.ott .otg .suo .swf .psd .ARC .ppt m .wk1.sxw .sxm .cpp .fla .nef .aes .xltm .wks.stw .mml .pas .wmv .tiff .gpg .xltx .hwp.uot .lay .asm .mpg .tif .vmx .xlc .rtf.3ds .lay6 .cmd .vob .cgm .vmdk .xlm .csv.max .asc .bat .mpeg .raw .vdi .xlt .txt.3dm .sqlite3 .ps1 .asf .gif .sldm .xlw .vsdx.ods .sqlitedb .vbs .avi .png .sldx .xlsb .vsd.ots .sql .dip .mov .bmp .sti .xlsm .eml.sxc .accdb .dch .m p4 .vcd .sxi .dotx .msg.stc .mdb .sch .3gp .iso .pptx .dotm .ost.dif .dbf .brd .mkv .backup .ppt .dot .pst.xlsx .xls .docx .doc<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #ff0000\"><strong>3. Attack PoC<\/strong><\/span><\/h3>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/poc.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1349\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/poc.jpg\" alt=\"Attack PoC\" width=\"545\" height=\"285\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/poc.jpg 502w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/poc-300x157.jpg 300w\" sizes=\"(max-width: 545px) 100vw, 545px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/WannaCry-Ransomware-Warning-Message-518x390-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1347\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/WannaCry-Ransomware-Warning-Message-518x390-1.jpg\" alt=\"Attack PoC\" width=\"541\" height=\"407\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/WannaCry-Ransomware-Warning-Message-518x390-1.jpg 518w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/WannaCry-Ransomware-Warning-Message-518x390-1-300x226.jpg 300w\" sizes=\"(max-width: 541px) 100vw, 541px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #ff0000\"><strong>4. Advisory Notes<\/strong><\/span><\/h3>\n<p>The EternalBlue SMB vulnerability was originally published by the Shadow Brokers who allegedly acquired NSA hacking tools. The vulnerability was published in April 2017 but patched prior to release by Microsoft in March 2017. The exploit is particularly dangerous because WannaCry 2.0 a ransomware uses remote code execution vulnerability that does not require any user interaction.<\/p>\n<p>Moreover, the malware can spread laterally as quickly as the commands can be processed by infected machines resulting in the highly virulent nature of this threat. Since the ransomware propagates primarily through the exploitation of the EternalBlue SMB vulnerability, multiple infections in the same organization are to be expected. This is because the exploit leverages a previously-patched Windows vulnerability and if an infected device does not have the appropriate patches it is likely other machines are similarly vulnerable.<\/p>\n<p>The inclusion of over twenty language variants for the ransom note supports the conclusion that this malware was not targeted at a particular country or entity, but rather was intended to spread as widely as possible.<\/p>\n<p>The success of this ransomware attack will almost certainly lead to future ransomware attacks attempting to propagate via critical Microsoft Windows vulnerabilities, even months after the vulnerability is publicly released and patched. The actor(s) behind this activity is currently unknown, and no major group has taken credit for the activity.<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #ff0000\"><strong>5. Mitigation Techniques<\/strong><\/span><\/h3>\n<p>Varutra Consulting recommends the following:<\/p>\n<ul>\n<li>Apply Microsoft patches MS17-010 \/ MS17-012 disabling SMB v1, and blocking all versions of SMB at the network boundary by blocking TCP port 445 with related protocols on UDP ports 137-138 and TCP port 139 for all boundary devices.<\/li>\n<li>Due to recent changes in Microsoft patch naming, ensure Microsoft Knowledge Base 4013389 has been applied to all systems, as it is another name for the MS17-010 SMB vulnerability patch.<\/li>\n<li>Do not pay any ransom associated with this activity. The actors may not even provide a decryption key, and furthermore doing so incentivizes and finances further criminal activity.<\/li>\n<li>Enable strong spam filters to prevent phishing e-mails from reaching the end users and authenticate in-bound e-mail using technologies like Sender Policy Framework (SPF), Domain Message Authentication Reporting and Conformance (DMARC), and DomainKeys Identified Mail (DKIM) to prevent e-mail spoofing.<\/li>\n<li>Prevent privileged execution of windows binaries from temp directories.<\/li>\n<li>Disable macro scripts from Microsoft Office files transmitted via e-mail. Consider using Office Viewer software to open Microsoft Office files transmitted via e-mail instead of full Office suite applications.<\/li>\n<li>Develop user security awareness training for identifying scams, malicious links, and attempted social engineering.<\/li>\n<li>Scan your perimeter and other Internet-facing network structures for the presence of open Windows SMB ports.<\/li>\n<li>Ensure that Snort Signatures ET-2024217, ET-2024218, and ET-2024220 are implemented to ensure lateral propagation detection within an enterprise network and not just at the border or perimeter.<\/li>\n<li>Below mentioned are the possibly infected IP\u2019s which need to be blocked on firewall immediately.<\/li>\n<\/ul>\n<table style=\"height: 549px\" width=\"557\">\n<tbody>\n<tr>\n<td width=\"320\">&nbsp;<\/p>\n<p>82.94.251.227:443<\/p>\n<p>213.239.216.222:443<\/p>\n<p>51.255.41.65:9001<\/p>\n<p>86.59.21.38:443<\/p>\n<p>198.199.64.217:443<\/p>\n<p>83.169.6.12:9001<\/p>\n<p>192.42.115.102:9004<\/p>\n<p>104.131.84.119:443<\/p>\n<p>178.254.44.135:9001<\/p>\n<p>163.172.25.118:22<\/p>\n<p>197.231.221.221:9001<\/p>\n<p>128.31.0.39:9191<\/p>\n<p>&nbsp;<\/td>\n<td width=\"320\">&nbsp;<\/p>\n<p>149.202.160.69:9001<\/p>\n<p>46.101.166.19:9090<\/p>\n<p>91.121.65.179:9001<\/p>\n<p>2.3.69.209:9001<\/p>\n<p>146.0.32.144:9001<\/p>\n<p>50.7.161.218:9001<\/p>\n<p>217.79.179.177:9001<\/p>\n<p>213.61.66.116:9003<\/p>\n<p>212.47.232.237:9001<\/p>\n<p>81.30.158.223:9001<\/p>\n<p>79.172.193.32:443<\/p>\n<p>38.229.72.16:443<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>Read about Petya Ransomware Threat Advisory blog post <a href=\"https:\/\/www.varutra.com\/blog\/?p=1432\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a><\/em><\/strong><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #ff0000\"><strong>6. References<\/strong><\/span><\/h3>\n<p>https:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Ransom:Win32\/WannaCrypt<\/p>\n<p>https:\/\/krebsonsecurity.com\/2016\/12\/before-you-pay-that-ransomware-demand\/<\/p>\n<p>http:\/\/webcast.gov.in\/cert-in\/<\/p>\n<p>https:\/\/blogs.technet.microsoft.com\/msrc\/2017\/05\/12\/customer-guidance-for-wannacrypt-attacks\/<\/p>","protected":false},"excerpt":{"rendered":"<p>Here we will discuss Threat Advisory Report on WannaCry Ransomware (Critical Severity). 1. Introduction On Friday, May 12, countless organizations around the world began fending&#8230;<\/p>\n","protected":false},"author":3,"featured_media":3230,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[140,276,269,284,282,288,266,274,280,57,283],"tags":[103,73,104,105,106,107],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"World began fending off attacks from a ransomware strain variously known as WannaCrypt, WanaDecrypt &amp; Wanna.Cry. Know more about WannaCry Ransomware Attack.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/threat-advisory-report-on-ransomware-wannacry-critical-severity\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"WannaCry Ransomware Attack - Threat Advisory Report\" \/>\n\t\t<meta property=\"og:description\" content=\"World began fending off attacks from a ransomware strain variously known as WannaCrypt, WanaDecrypt &amp; Wanna.Cry. Know more about WannaCry Ransomware Attack.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/threat-advisory-report-on-ransomware-wannacry-critical-severity\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/threat-Advisory-Copy.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/threat-Advisory-Copy.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"1250\" \/>\n\t\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t\t<meta property=\"article:section\" content=\"Case Study\" \/>\n\t\t<meta property=\"article:tag\" content=\"advisory\" \/>\n\t\t<meta property=\"article:tag\" content=\"malware\" \/>\n\t\t<meta property=\"article:tag\" content=\"ransomware\" \/>\n\t\t<meta property=\"article:tag\" content=\"virus\" \/>\n\t\t<meta property=\"article:tag\" content=\"wanna cry\" \/>\n\t\t<meta property=\"article:tag\" content=\"wannacry\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2017-05-16T11:08:03+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-12-02T10:57:43+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"WannaCry Ransomware Attack - Threat Advisory Report\" \/>\n\t\t<meta name=\"twitter:description\" content=\"World began fending off attacks from a ransomware strain variously known as WannaCrypt, WanaDecrypt &amp; Wanna.Cry. Know more about WannaCry Ransomware Attack.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/threat-Advisory-Copy.png\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpadmin\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/threat-advisory-report-on-ransomware-wannacry-critical-severity\\\/#article\",\"name\":\"WannaCry Ransomware Attack - Threat Advisory Report\",\"headline\":\"Threat Advisory Report on WannaCry Ransomware (Critical Severity)\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/threat-Advisory-Copy.png\",\"width\":1250,\"height\":750,\"caption\":\"threat Advisory - Copy\"},\"datePublished\":\"2017-05-16T11:08:03+05:30\",\"dateModified\":\"2022-12-02T16:27:43+05:30\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/threat-advisory-report-on-ransomware-wannacry-critical-severity\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/threat-advisory-report-on-ransomware-wannacry-critical-severity\\\/#webpage\"},\"articleSection\":\"Case Study, Cyber Attack, Data Breaches, Encryption &amp; Cryptography, Patch Management, Ransomware Attack, Security Advisory, Security Hardening, Viruses &amp; Malware, Vulnerability Disclosure, Zero Day Attack, advisory, malware, Ransomware, Virus, wanna cry, wannacry\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/threat-advisory-report-on-ransomware-wannacry-critical-severity\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/threat-advisory-report-on-ransomware-wannacry-critical-severity\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/threat-advisory-report-on-ransomware-wannacry-critical-severity\\\/#listItem\",\"position\":2,\"name\":\"Threat Advisory Report on WannaCry Ransomware (Critical Severity)\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/threat-advisory-report-on-ransomware-wannacry-critical-severity\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/threat-advisory-report-on-ransomware-wannacry-critical-severity\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/\",\"name\":\"kalpadmin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/threat-advisory-report-on-ransomware-wannacry-critical-severity\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpadmin\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/threat-advisory-report-on-ransomware-wannacry-critical-severity\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/threat-advisory-report-on-ransomware-wannacry-critical-severity\\\/\",\"name\":\"WannaCry Ransomware Attack - Threat Advisory Report\",\"description\":\"World began fending off attacks from a ransomware strain variously known as WannaCrypt, WanaDecrypt & Wanna.Cry. Know more about WannaCry Ransomware Attack.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/threat-advisory-report-on-ransomware-wannacry-critical-severity\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/threat-Advisory-Copy.png\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/threat-advisory-report-on-ransomware-wannacry-critical-severity\\\/#mainImage\",\"width\":1250,\"height\":750,\"caption\":\"threat Advisory - Copy\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/threat-advisory-report-on-ransomware-wannacry-critical-severity\\\/#mainImage\"},\"datePublished\":\"2017-05-16T11:08:03+05:30\",\"dateModified\":\"2022-12-02T16:27:43+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>WannaCry Ransomware Attack - Threat Advisory Report<\/title>\n\n","aioseo_head_json":{"title":"WannaCry Ransomware Attack - Threat Advisory Report","description":"World began fending off attacks from a ransomware strain variously known as WannaCrypt, WanaDecrypt & Wanna.Cry. Know more about WannaCry Ransomware Attack.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/threat-advisory-report-on-ransomware-wannacry-critical-severity\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"WannaCry Ransomware Attack - Threat Advisory Report","og:description":"World began fending off attacks from a ransomware strain variously known as WannaCrypt, WanaDecrypt &amp; Wanna.Cry. Know more about WannaCry Ransomware Attack.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/threat-advisory-report-on-ransomware-wannacry-critical-severity\/","og:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/threat-Advisory-Copy.png","og:image:secure_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/threat-Advisory-Copy.png","og:image:width":"1250","og:image:height":"750","article:section":"Case Study","article:tag":["advisory","malware","ransomware","virus","wanna cry","wannacry"],"article:published_time":"2017-05-16T11:08:03+00:00","article:modified_time":"2022-12-02T10:57:43+00:00","twitter:card":"summary_large_image","twitter:title":"WannaCry Ransomware Attack - Threat Advisory Report","twitter:description":"World began fending off attacks from a ransomware strain variously known as WannaCrypt, WanaDecrypt &amp; Wanna.Cry. Know more about WannaCry Ransomware Attack.","twitter:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/threat-Advisory-Copy.png","twitter:label1":"Written by","twitter:data1":"kalpadmin","twitter:label2":"Est. reading time","twitter:data2":"7 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/threat-advisory-report-on-ransomware-wannacry-critical-severity\/#article","name":"WannaCry Ransomware Attack - Threat Advisory Report","headline":"Threat Advisory Report on WannaCry Ransomware (Critical Severity)","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/threat-Advisory-Copy.png","width":1250,"height":750,"caption":"threat Advisory - Copy"},"datePublished":"2017-05-16T11:08:03+05:30","dateModified":"2022-12-02T16:27:43+05:30","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/threat-advisory-report-on-ransomware-wannacry-critical-severity\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/threat-advisory-report-on-ransomware-wannacry-critical-severity\/#webpage"},"articleSection":"Case Study, Cyber Attack, Data Breaches, Encryption &amp; Cryptography, Patch Management, Ransomware Attack, Security Advisory, Security Hardening, Viruses &amp; Malware, Vulnerability Disclosure, Zero Day Attack, advisory, malware, Ransomware, Virus, wanna cry, wannacry"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/threat-advisory-report-on-ransomware-wannacry-critical-severity\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/threat-advisory-report-on-ransomware-wannacry-critical-severity\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/threat-advisory-report-on-ransomware-wannacry-critical-severity\/#listItem","position":2,"name":"Threat Advisory Report on WannaCry Ransomware (Critical Severity)","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/threat-advisory-report-on-ransomware-wannacry-critical-severity\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/threat-advisory-report-on-ransomware-wannacry-critical-severity\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/","name":"kalpadmin","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/threat-advisory-report-on-ransomware-wannacry-critical-severity\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpadmin"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/threat-advisory-report-on-ransomware-wannacry-critical-severity\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/threat-advisory-report-on-ransomware-wannacry-critical-severity\/","name":"WannaCry Ransomware Attack - Threat Advisory Report","description":"World began fending off attacks from a ransomware strain variously known as WannaCrypt, WanaDecrypt & Wanna.Cry. Know more about WannaCry Ransomware Attack.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/threat-advisory-report-on-ransomware-wannacry-critical-severity\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/threat-Advisory-Copy.png","@id":"https:\/\/www.varutra.com\/varutravrt3\/threat-advisory-report-on-ransomware-wannacry-critical-severity\/#mainImage","width":1250,"height":750,"caption":"threat Advisory - Copy"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/threat-advisory-report-on-ransomware-wannacry-critical-severity\/#mainImage"},"datePublished":"2017-05-16T11:08:03+05:30","dateModified":"2022-12-02T16:27:43+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"1342","title":"WannaCry Ransomware Attack - Threat Advisory Report","description":"World began fending off attacks from a ransomware strain variously known as WannaCrypt, WanaDecrypt &amp; Wanna.Cry. Know more about WannaCry Ransomware Attack.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"WannaCry \",\"score\":80,\"analysis\":{\"keyphraseInTitle\":{\"title\":\"Focus keyphrase in SEO title\",\"description\":\"Focus keyphrase found in SEO title.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"title\":\"Focus keyphrase in meta description\",\"description\":\"Focus keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Focus keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":1},\"keyphraseInURL\":{\"title\":\"Focus keyphrase in URL\",\"description\":\"Focus keyphrase used in the URL.\",\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"title\":\"Focus keyphrase in introduction\",\"description\":\"Your Focus keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInSubHeadings\":{\"title\":\"Focus keyphrase in Subheadings\",\"description\":\"Use your focus keyphrase more in your H2 and H3 subheadings.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Focus keyphrase in image alt attributes\",\"description\":\"Focus keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},\"additional\":[{\"keyphrase\":\"WannaCry Ransomware Attack\",\"score\":67,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":3},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase not found in image alt attribute(s). Add an image with your Keyphrase as alt text.\",\"score\":3,\"maxScore\":9,\"error\":1}}},{\"keyphrase\":\"WannaCry Ransomware\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},{\"keyphrase\":\"Ransomware Attack\",\"score\":67,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase not found in image alt attribute(s). Add an image with your Keyphrase as alt text.\",\"score\":3,\"maxScore\":9,\"error\":1}}}]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"featured","og_image_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/threat-Advisory-Copy.png","og_image_width":"1250","og_image_height":"750","og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":"Case Study","og_article_tags":[],"twitter_use_og":true,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2021-10-27 15:17:57","updated":"2022-12-02 10:59:38"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/case-study\/\" title=\"Case Study\">Case Study<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tThreat Advisory Report on WannaCry Ransomware (Critical Severity)\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Case Study","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/case-study\/"},{"label":"Threat Advisory Report on WannaCry Ransomware (Critical Severity)","link":"https:\/\/www.varutra.com\/varutravrt3\/threat-advisory-report-on-ransomware-wannacry-critical-severity\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/1342"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=1342"}],"version-history":[{"count":6,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/1342\/revisions"}],"predecessor-version":[{"id":20366,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/1342\/revisions\/20366"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/3230"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=1342"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=1342"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=1342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}