Skip to main content

Cybersecurity Attacks: Analysis of “WannaCry” Attack and Proposing Methods for Reducing or Preventing Such Attacks in Future

  • Conference paper
  • First Online:
ICT Systems and Sustainability

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1270))

Abstract

The technological revolution in the last few years has erased the communicational barriers and created a global network of users and data. At the same time, they have also made it easy for malwares and other cybersecurity threats to spread easily among users through networks. The threat of ransomwares in particularly has been risen in the last few years, with 2017 witnessing one of the most destructive ransomware attacks in the history of Internet. This attack known as the “WannaCry” has infected computers across the globe and crippled both individuals and organizations. The essay provides an analysis of this attack including its definitions, methods of infections, its impact on the society as well as discussion some important detection and prevention techniques to avoid similar attacks in future.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. S. Mohurle, M. Patil, A brief study of wannacry threat: ransomware attack 2017. Int. J. Adv. Res. Comput. Sci. 8(5), 1938–1940 (2017)

    Google Scholar 

  2. L.Y. Connolly, D.S. Wall, The rise of crypto-ransomware in a changing cybercrime landscape: taxonomising countermeasures. Comput. Secur. 87, 101568 (2019)

    Google Scholar 

  3. Internet Security Threat Report: 2017 https://digitalhubshare.symantec.com/content/dam/Atlantis/campaigns-and-launches/FY17/Threat%20Protection/ISTR22_Main-FINAL-JUN8.pdf?aid=elq_

  4. S. Mansfield-Devine, Ransomware: taking businesses hostage. Netw. Secur. 2016(10), 8–17 (2016)

    Article  Google Scholar 

  5. G. Ledin, The Growing Harm of Not Teaching Malware. Commun. ACM 54(2), 32–34 (2011)

    Article  Google Scholar 

  6. R. Brewer, Ransomware attacks: detection, prevention and cure. Netw. Secur. 2016(9), 5–9 (2016)

    Article  Google Scholar 

  7. A. Liska, T. Gallo, Ransomware: Defending Against Digital Extortion (O’Reilly Media Inc., New York, 2016)

    Google Scholar 

  8. J.Greene, Ransomware (Salem Press Encyclopedia of Science, New Jersey, 2017)

    Google Scholar 

  9. A. Levy, Avoiding the Ransom: Cybersecurity for Business Owners and Managers (Magnet Solutions Group Press, Austin, 2016)

    Google Scholar 

  10. J. Allen, Surviving ransomware. Am. J. Fam. Law 31(2), 65–68 (2017)

    Google Scholar 

  11. M. Wecksten, J. Frick, A. Sjostrom, E. Jarpe, A novel method for recovery from Crypto Ransomware infections. In 2016 the 2nd IEEE International Conference On Computer And Communications (ICCC), (2016 October)

    Google Scholar 

  12. I. Bica, R. Reyhanitabar, Innovative security solutions for information technology and communications. In: 2016 the 9th International Conference (SECITC) (2016, June)

    Google Scholar 

  13. C. Rozas, H. Khosravi, D.K. Sundar, Y. Bulygin, Enhanced Detection of Malware. Intel Technology Journal 13(2), 6–15 (2009)

    Google Scholar 

  14. J.M. Ehrenfeld, WannaCry, cybersecurity and health information technology: a time to act. J. Med. Syst. 41(7), 104 (2017)

    Article  Google Scholar 

  15. J. Stevenson, The WannaCry ransomware attack (2017). Strategic Comments 23(4), vii–ix (2017)

    Article  Google Scholar 

  16. W. Ashford, Ransomware attack could be wake-up call: a failure by many organisations to take cyber security seriously has long been blamed on the lack of a single significant event to shake things up. Does WannaCry fit the bill? Comput. Wkly. 4–5 (2017)

    Google Scholar 

  17. R. Hackett, Why a global cyber crisis stalled-this time. Time 189(20), 7–9 (2017)

    Google Scholar 

  18. A.L. Young, M. Yung, Privacy and security cryptovirology: the birth, neglect, and explosion of ransomware. Commun. ACM 60(7), 24–26 (2017)

    Article  Google Scholar 

  19. B. Brian, WannaCry Exposes Defense Supply Chain Vulnerabilities. National Defence 20–21 (2017)

    Google Scholar 

  20. A. Azad, Ransomware: a research and a personal case study of dealing with this Nasty Malware. Informing Sci. Inf. Technol. 14, 087–099 (2017)

    Article  Google Scholar 

  21. R. Upadhyaya, A. Jain, Cyber ethics and cyber crime: a deep dwelved study into legality, ransomware, underground web and bitcoin wallet. In: 2016 International Conference on Computing, Communication and Automation (ICCCA) (2016, April)

    Google Scholar 

  22. J. Thornton, Don’t click bait from cyber criminals. Public Finance. 11, 43 (2015)

    Google Scholar 

  23. D. Clemente, Cyber Security and Global Interdependence: What Is Critical? (2013) https://www.chathamhouse.org/sites/files/chathamhouse/public/Research/International%20Security/0213pr_cyber.pdf

  24. D. Cliff, Failures in Ultra Large Scale Complex Systems (The Chartered Insurance Institute, London, 2012)

    Google Scholar 

  25. P. Shakarian, J. Shakarian, A. Ruef, Introduction to Cyber-Warfare: A Multidisciplinary Approach (Elsevier, Waltham, 2013)

    Google Scholar 

  26. C. Han, R. Dongre, What motivates cyber-attackers? Technol. Innov. Manag. Rev. 4(10), 40–42 (2014)

    Article  Google Scholar 

  27. D. Russell, G.T. Gangemi, Computer Security Basics (O’Reilly & Associates, California, 1993)

    Google Scholar 

  28. S.W. Brenner, Cybercrime: Criminal Threats from Cyberspace (Praeger, Santa Barbara, 2010)

    Google Scholar 

  29. R. Richardson, North, M: Ransomware: Evolution, Mitigation and Prevention. International. Manag. Rev. 13(1), 10–21 (2017)

    Google Scholar 

  30. Microsoft Website: How to enable and disable SMBv1, SMBv2, and SMBv3 in Windows and Windows Server. https://support.microsoft.com/en-us/help/2696547/how-to-enable-and-disable-smbv1-smbv2-and-smbv3-in-windows-and-windows (2017)

  31. K. Kendall, Practical Malware Analysis. In: Black Hat Conference, USA (2007)

    Google Scholar 

  32. G. Radhamani, G.S. Rao, Web Services Security and e-business (Idea Group Inc., PA, 2007)

    Book  Google Scholar 

  33. T. Craig, Internet: Technology, People, Process (Hodder Wayland, London, 2002)

    Google Scholar 

  34. T. Brewster, WannaCry Hackers Are Using This Swiss Company To Launder $142,000 Bitcoin Ransoms. (2017). https://www.forbes.com/sites/thomasbrewster/2017/08/03/wannacry-hackers-use-shapeshift-to-launder-bitcoin/#4638139f3d0d

  35. G. Slabodkin, WannaCry had wide impact: recent ransomware attack hit much harder than initial estimates; NHS facilities, two U.S. healthcare systems are among its victims. Health Data Manag. 25(3), 6 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sumaiah Algarni .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Algarni, S. (2021). Cybersecurity Attacks: Analysis of “WannaCry” Attack and Proposing Methods for Reducing or Preventing Such Attacks in Future. In: Tuba, M., Akashe, S., Joshi, A. (eds) ICT Systems and Sustainability. Advances in Intelligent Systems and Computing, vol 1270. Springer, Singapore. https://doi.org/10.1007/978-981-15-8289-9_73

Download citation

Publish with us

Policies and ethics