Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • Deepfake Threats in Cybersecurity: A Coordinated Response and Awareness Effort
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Cyber Security Awareness Month Tip»The WannaCry Ransomware Attack
    Cyber Security Awareness Month Tip

    The WannaCry Ransomware Attack

    By Sofia CoraOctober 28, 20223 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

    In 2017, approximately 300,000 computers worldwide were infected by the WannaCry ransomware, a crypto ransomware worm that affects Windows PCs. This malware spread primarily through corporate network PCs, encrypting critical files and demanding a ransom be paid for decryption. Due to a lack of preparation for such attacks, victims typically did not receive their files in return, regardless of whether the ransom was paid. This attack created serious and dangerous disturbances for a variety of companies, online communications, hospitals, and banks across the world.

    This WannaCry worm proved advantageous not only because of its ability to jump from network to network, but also because the nature of worm malware does not require computer users to click a link or interact with an infected file for the malware to activate. The WannaCry worm was able to exploit a weakness in Microsoft’s server message block to spread across the network.

    In total, up to 300,000 computers in 150 countries were infected, affecting various companies, hospitals, and banks. In one case, Britain’s National Health Service saw its forty hospitals simultaneously attacked and compromised, causing “canceled surgeries, medical appointments, and lab results on hold.”

    Eventually, the rapid spread of the WannaCry Ransomware was effectively stopped by British researcher Marcus Hutchins. Research revealed that in order for the malware to activate, the code required an attempt and failure to open an unregistered faulty web address. Hutchins simply registered the URL, stopping the worm before it could activate.

    Despite the initial widespread catastrophe coming to a close, effects from this malware are still felt today. There were even appearances of new variants of the worm that operated without the kill-switch URL during the COVID-19 pandemic. While the WannaCry ransomware will likely never pose as widespread of a threat as it did in 2017, the vulnerabilities which allowed the attack to occur show us the importance of proper cybersecurity measures, especially as reliance on technological resources increases over time.

    The global reach of the WannaCry Ransomware attacks and the general unpreparedness to such attacks across a wide range of industries demonstrated the need for a prioritization of cybersecurity due diligence. It’s crucial to stay educated and keep up to date with cybersecurity measures that prevent you from becoming a target.  For more information, check out some of our previous blog posts:

    • What is Ransomware?
    • Alert: Critical Microsoft Vulnerability
    • Creating a Strong Password
    • Trojan Virus: What is it and How to avoid it

    Sources:

    • https://www.mimecast.com/blog/all-you-need-to-know-about-wannacry-ransomware/
    • https://www.jstor.org/stable/pdf/27021830.pdf?ab_segments=0%252Fbasic_search_gsv2%252Fcontrol&refreqid=excelsior%3A437b6ea94971dab158c3331dff5ce5c5
    • https://www.jstor.org/stable/pdf/26441292.pdf?ab_segments=0%252Fbasic_search_gsv2%252Fcontrol&refreqid=excelsior%3A9651af8ce67d99721ce1a0cc43f0997b

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    Cybersecurity Awareness Month Tip Cybersecurity Month News and Events
    Previous ArticleDumpster Diving: How to Dispose of Information Properly
    Next Article TikTok’s Complicated Relationship To China Poses A Serious Threat To American Users

    Related Posts

    Deepfake Threats in Cybersecurity: A Coordinated Response and Awareness Effort

    5 Active Malware Campaigns in Early 2025: What You Need to Know

    10 Critical Network Pentest Findings IT Teams Overlook

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (334)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (105)
    • Security Awareness (263)
    • Security Guides (35)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d