Abstract
The technological revolution in the last few years has erased the communicational barriers and created a global network of users and data. At the same time, they have also made it easy for malwares and other cybersecurity threats to spread easily among users through networks. The threat of ransomwares in particularly has been risen in the last few years, with 2017 witnessing one of the most destructive ransomware attacks in the history of Internet. This attack known as the “WannaCry” has infected computers across the globe and crippled both individuals and organizations. The essay provides an analysis of this attack including its definitions, methods of infections, its impact on the society as well as discussion some important detection and prevention techniques to avoid similar attacks in future.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
S. Mohurle, M. Patil, A brief study of wannacry threat: ransomware attack 2017. Int. J. Adv. Res. Comput. Sci. 8(5), 1938–1940 (2017)
L.Y. Connolly, D.S. Wall, The rise of crypto-ransomware in a changing cybercrime landscape: taxonomising countermeasures. Comput. Secur. 87, 101568 (2019)
Internet Security Threat Report: 2017 https://digitalhubshare.symantec.com/content/dam/Atlantis/campaigns-and-launches/FY17/Threat%20Protection/ISTR22_Main-FINAL-JUN8.pdf?aid=elq_
S. Mansfield-Devine, Ransomware: taking businesses hostage. Netw. Secur. 2016(10), 8–17 (2016)
G. Ledin, The Growing Harm of Not Teaching Malware. Commun. ACM 54(2), 32–34 (2011)
R. Brewer, Ransomware attacks: detection, prevention and cure. Netw. Secur. 2016(9), 5–9 (2016)
A. Liska, T. Gallo, Ransomware: Defending Against Digital Extortion (O’Reilly Media Inc., New York, 2016)
J.Greene, Ransomware (Salem Press Encyclopedia of Science, New Jersey, 2017)
A. Levy, Avoiding the Ransom: Cybersecurity for Business Owners and Managers (Magnet Solutions Group Press, Austin, 2016)
J. Allen, Surviving ransomware. Am. J. Fam. Law 31(2), 65–68 (2017)
M. Wecksten, J. Frick, A. Sjostrom, E. Jarpe, A novel method for recovery from Crypto Ransomware infections. In 2016 the 2nd IEEE International Conference On Computer And Communications (ICCC), (2016 October)
I. Bica, R. Reyhanitabar, Innovative security solutions for information technology and communications. In: 2016 the 9th International Conference (SECITC) (2016, June)
C. Rozas, H. Khosravi, D.K. Sundar, Y. Bulygin, Enhanced Detection of Malware. Intel Technology Journal 13(2), 6–15 (2009)
J.M. Ehrenfeld, WannaCry, cybersecurity and health information technology: a time to act. J. Med. Syst. 41(7), 104 (2017)
J. Stevenson, The WannaCry ransomware attack (2017). Strategic Comments 23(4), vii–ix (2017)
W. Ashford, Ransomware attack could be wake-up call: a failure by many organisations to take cyber security seriously has long been blamed on the lack of a single significant event to shake things up. Does WannaCry fit the bill? Comput. Wkly. 4–5 (2017)
R. Hackett, Why a global cyber crisis stalled-this time. Time 189(20), 7–9 (2017)
A.L. Young, M. Yung, Privacy and security cryptovirology: the birth, neglect, and explosion of ransomware. Commun. ACM 60(7), 24–26 (2017)
B. Brian, WannaCry Exposes Defense Supply Chain Vulnerabilities. National Defence 20–21 (2017)
A. Azad, Ransomware: a research and a personal case study of dealing with this Nasty Malware. Informing Sci. Inf. Technol. 14, 087–099 (2017)
R. Upadhyaya, A. Jain, Cyber ethics and cyber crime: a deep dwelved study into legality, ransomware, underground web and bitcoin wallet. In: 2016 International Conference on Computing, Communication and Automation (ICCCA) (2016, April)
J. Thornton, Don’t click bait from cyber criminals. Public Finance. 11, 43 (2015)
D. Clemente, Cyber Security and Global Interdependence: What Is Critical? (2013) https://www.chathamhouse.org/sites/files/chathamhouse/public/Research/International%20Security/0213pr_cyber.pdf
D. Cliff, Failures in Ultra Large Scale Complex Systems (The Chartered Insurance Institute, London, 2012)
P. Shakarian, J. Shakarian, A. Ruef, Introduction to Cyber-Warfare: A Multidisciplinary Approach (Elsevier, Waltham, 2013)
C. Han, R. Dongre, What motivates cyber-attackers? Technol. Innov. Manag. Rev. 4(10), 40–42 (2014)
D. Russell, G.T. Gangemi, Computer Security Basics (O’Reilly & Associates, California, 1993)
S.W. Brenner, Cybercrime: Criminal Threats from Cyberspace (Praeger, Santa Barbara, 2010)
R. Richardson, North, M: Ransomware: Evolution, Mitigation and Prevention. International. Manag. Rev. 13(1), 10–21 (2017)
Microsoft Website: How to enable and disable SMBv1, SMBv2, and SMBv3 in Windows and Windows Server. https://support.microsoft.com/en-us/help/2696547/how-to-enable-and-disable-smbv1-smbv2-and-smbv3-in-windows-and-windows (2017)
K. Kendall, Practical Malware Analysis. In: Black Hat Conference, USA (2007)
G. Radhamani, G.S. Rao, Web Services Security and e-business (Idea Group Inc., PA, 2007)
T. Craig, Internet: Technology, People, Process (Hodder Wayland, London, 2002)
T. Brewster, WannaCry Hackers Are Using This Swiss Company To Launder $142,000 Bitcoin Ransoms. (2017). https://www.forbes.com/sites/thomasbrewster/2017/08/03/wannacry-hackers-use-shapeshift-to-launder-bitcoin/#4638139f3d0d
G. Slabodkin, WannaCry had wide impact: recent ransomware attack hit much harder than initial estimates; NHS facilities, two U.S. healthcare systems are among its victims. Health Data Manag. 25(3), 6 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Algarni, S. (2021). Cybersecurity Attacks: Analysis of “WannaCry” Attack and Proposing Methods for Reducing or Preventing Such Attacks in Future. In: Tuba, M., Akashe, S., Joshi, A. (eds) ICT Systems and Sustainability. Advances in Intelligent Systems and Computing, vol 1270. Springer, Singapore. https://doi.org/10.1007/978-981-15-8289-9_73
Download citation
DOI: https://doi.org/10.1007/978-981-15-8289-9_73
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-8288-2
Online ISBN: 978-981-15-8289-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)