SlideShare una empresa de Scribd logo
1 de 6
Case Study:Wannacry
Ransomware attacks
Telefónica
Sergio Renteria Nuñez
Ransomware
Attack
● Ransomware is a type of malware that targets computer systems. Its
operation varies depending on the type.There are 3 main types or families
of Ransomware: Crypto, Locker, and Leakware/Doxware.The Crypto family
encrypts a group of files on the station; the Locker type, blocks access to
the computer; whereas, the Leakware/Doxware family blocks access to the
operating system and files, threatening the user with the publication of
confidential information.The common denominator that the 3 families
have is that the device and the information is inaccessible and to recover it,
a ransom must be paid, typically in cryptocurrencies such as Bitcoin.
● According to cybersecurityventures.com: "Global Ransomware Damage
Costs PredictedTo Exceed $265 Billion By 2031.
Fastest growing type of cybercrime is expected to attack a business,
consumer, or device every 2 seconds by 2031".
What
happened in
Telefónica?
● Founded in 1924,Telefónica, S. A. is a Spanish multinational telecommunications
corporation based on Madrid. It offers telephone, internet and television products and
services. It is currently the fourth largest company in Europe and the thirteenth
worldwide. In addition, it is listed on the Spanish stock market under the acronymTEF
of the IBEX 35 stock index.
● According to Microsoft, the NSA was looking for vulnerabilities inWindows products
during 2011. By 2012 they found a bug in the SMBv1 protocol ofWindows systems and
developed the Eternal Blue exploit, which was stolen in 2016.This fact caused the NSA
to notify Microsoft of the vulnerability in February 2017, so on March 14, 2017, the
company published the security bulletin MS17-010 with CVE-2017-0145. Later, in April
2017, a group of hackers called Shadow Brokers leaked Eternal Blue which served as the
basis for the worldwide ransomware attack calledWannacry.
TheWannacry cyberattack started on May 12, 2017, with Spanish companies being the
first victims, and specificallyTelefónica.The CDO of the organization reported via his
blog that using a phishing campaign someone fromTelefónica downloaded a dropper
through a link, thereby infecting his computer.The infected computer scanned the LAN
for computers vulnerable to Eternal Blue in order to infect them and continue
spreading. Likewise, the objective ofWannacry was to encrypt the files and not steal
data.To decrypt the information, it requested a ransom of 300 dollars in Bitcoin.
Timeline
2011: NSA was looking for vulnerabilities inWindows products
during this year, according to Microsoft.
2012: NSA found a bug in several versions ofWindows and
developed the Eternal Blue exploit.
2016:The Eternal Blue exploit was stolen from NSA by Shadow
Brokers, a hacking group.
2017: NSA notifies Microsoft about the vulnerability in February. On
March 14th, the company published the security bulletin
MS17-010 with CVE-2017-0145.
2017: In April, Shadow Brokers leaked Eternal Blue.
Wannacry attack started on May 12th.That day, aTelefónica
employee clicked on a link in a phishing email and
downloaded a dropper, thus infecting his computer and later
other computers with the ransomware.
2017:Wannacry encrypted the files of hundreds of computers and
to decrypt them they asked for 300 dollars in Bitcoin for each
computer, which was rejected.Telefónica disconnected the equipment from a
part of the LAN. Finally, the CDO announced viaTwitter that they had been
affected by the malware.
Wannacry ransomware
attacksTelefónica
1
2
3
4
5
6
Vulnerabilities
Lack of user
computer security
education and a strict
vulnerability
management policy.
Phishing
Lack of education in basic
computer security and in
this type of attack in
particular.
Vulnerability and Patch
Management Program
Delay in the discovery of
vulnerabilities and in the
application of their
respective patches.
Systems
Lack of upgrade in
operating systems.
Costs Prevention
• Nearly $260,000 from repairing approximately
650 computers at an average cost of $400 each.
• AlthoughWannacry did not affect its clients,
there was an economic impact due to the
disconnection of the personnel during the 48
hours it took to solve the incident.
• Costs derived from overtime for security checks
and investment in implementing additional
security measures.
• Reputational damage and reduced trust of
customers and partners.
• Education, by levels, in cybersecurity for all
company workers.
• Early detection.
• Follow a strict vulnerability and patch
management plan.
• Keep operating system and all software updated
and configured.
• Perform regular backups and keep them isolated
from the network segment.
• An intelligent SOC with machine learning in order
to detect anomalous behavior.

Más contenido relacionado

Similar a Case Study: Wannacry Ransomware attacks Telefónica

Identify one cyberattack that occurred in the last 2 years. What cau.pdf
Identify one cyberattack that occurred in the last 2 years. What cau.pdfIdentify one cyberattack that occurred in the last 2 years. What cau.pdf
Identify one cyberattack that occurred in the last 2 years. What cau.pdf
fatoryoutlets
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
write12
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
bkbk37
 

Similar a Case Study: Wannacry Ransomware attacks Telefónica (20)

Identify one cyberattack that occurred in the last 2 years. What cau.pdf
Identify one cyberattack that occurred in the last 2 years. What cau.pdfIdentify one cyberattack that occurred in the last 2 years. What cau.pdf
Identify one cyberattack that occurred in the last 2 years. What cau.pdf
 
RIFDHY RM ( Cybersecurity ).pdf
RIFDHY RM ( Cybersecurity ).pdfRIFDHY RM ( Cybersecurity ).pdf
RIFDHY RM ( Cybersecurity ).pdf
 
Ransomware
RansomwareRansomware
Ransomware
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About RansomwareWhat Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
 
Escan advisory wannacry ransomware
Escan advisory wannacry ransomwareEscan advisory wannacry ransomware
Escan advisory wannacry ransomware
 
A comprehensive survey ransomware attacks prevention, monitoring and damage c...
A comprehensive survey ransomware attacks prevention, monitoring and damage c...A comprehensive survey ransomware attacks prevention, monitoring and damage c...
A comprehensive survey ransomware attacks prevention, monitoring and damage c...
 
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
 
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimes
 
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
 
News Bytes
News BytesNews Bytes
News Bytes
 
MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
 
HR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataHR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company Data
 
Combating RANSOMWare
Combating RANSOMWareCombating RANSOMWare
Combating RANSOMWare
 

Último

Último (20)

Workshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit Milan
Workshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit MilanWorkshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit Milan
Workshop: Enabling GenAI Breakthroughs with Knowledge Graphs - GraphSummit Milan
 
AI Hackathon.pptx
AI                        Hackathon.pptxAI                        Hackathon.pptx
AI Hackathon.pptx
 
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product UpdatesGraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
 
What is an API Development- Definition, Types, Specifications, Documentation.pdf
What is an API Development- Definition, Types, Specifications, Documentation.pdfWhat is an API Development- Definition, Types, Specifications, Documentation.pdf
What is an API Development- Definition, Types, Specifications, Documentation.pdf
 
Wired_2.0_CREATE YOUR ULTIMATE LEARNING ENVIRONMENT_JCON_16052024
Wired_2.0_CREATE YOUR ULTIMATE LEARNING ENVIRONMENT_JCON_16052024Wired_2.0_CREATE YOUR ULTIMATE LEARNING ENVIRONMENT_JCON_16052024
Wired_2.0_CREATE YOUR ULTIMATE LEARNING ENVIRONMENT_JCON_16052024
 
Lessons Learned from Building a Serverless Notifications System.pdf
Lessons Learned from Building a Serverless Notifications System.pdfLessons Learned from Building a Serverless Notifications System.pdf
Lessons Learned from Building a Serverless Notifications System.pdf
 
Microsoft365_Dev_Security_2024_05_16.pdf
Microsoft365_Dev_Security_2024_05_16.pdfMicrosoft365_Dev_Security_2024_05_16.pdf
Microsoft365_Dev_Security_2024_05_16.pdf
 
Optimizing Operations by Aligning Resources with Strategic Objectives Using O...
Optimizing Operations by Aligning Resources with Strategic Objectives Using O...Optimizing Operations by Aligning Resources with Strategic Objectives Using O...
Optimizing Operations by Aligning Resources with Strategic Objectives Using O...
 
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
 
IT Software Development Resume, Vaibhav jha 2024
IT Software Development Resume, Vaibhav jha 2024IT Software Development Resume, Vaibhav jha 2024
IT Software Development Resume, Vaibhav jha 2024
 
How to install and activate eGrabber JobGrabber
How to install and activate eGrabber JobGrabberHow to install and activate eGrabber JobGrabber
How to install and activate eGrabber JobGrabber
 
Automate your OpenSIPS config tests - OpenSIPS Summit 2024
Automate your OpenSIPS config tests - OpenSIPS Summit 2024Automate your OpenSIPS config tests - OpenSIPS Summit 2024
Automate your OpenSIPS config tests - OpenSIPS Summit 2024
 
The mythical technical debt. (Brooke, please, forgive me)
The mythical technical debt. (Brooke, please, forgive me)The mythical technical debt. (Brooke, please, forgive me)
The mythical technical debt. (Brooke, please, forgive me)
 
Malaysia E-Invoice digital signature docpptx
Malaysia E-Invoice digital signature docpptxMalaysia E-Invoice digital signature docpptx
Malaysia E-Invoice digital signature docpptx
 
Sourcing Success - How to Find a Clothing Manufacturer
Sourcing Success - How to Find a Clothing ManufacturerSourcing Success - How to Find a Clothing Manufacturer
Sourcing Success - How to Find a Clothing Manufacturer
 
Community is Just as Important as Code by Andrea Goulet
Community is Just as Important as Code by Andrea GouletCommunity is Just as Important as Code by Andrea Goulet
Community is Just as Important as Code by Andrea Goulet
 
A Deep Dive into Secure Product Development Frameworks.pdf
A Deep Dive into Secure Product Development Frameworks.pdfA Deep Dive into Secure Product Development Frameworks.pdf
A Deep Dive into Secure Product Development Frameworks.pdf
 
INGKA DIGITAL: Linked Metadata by Design
INGKA DIGITAL: Linked Metadata by DesignINGKA DIGITAL: Linked Metadata by Design
INGKA DIGITAL: Linked Metadata by Design
 
5 Reasons Driving Warehouse Management Systems Demand
5 Reasons Driving Warehouse Management Systems Demand5 Reasons Driving Warehouse Management Systems Demand
5 Reasons Driving Warehouse Management Systems Demand
 
Salesforce Introduced Zero Copy Partner Network to Simplify the Process of In...
Salesforce Introduced Zero Copy Partner Network to Simplify the Process of In...Salesforce Introduced Zero Copy Partner Network to Simplify the Process of In...
Salesforce Introduced Zero Copy Partner Network to Simplify the Process of In...
 

Case Study: Wannacry Ransomware attacks Telefónica

  • 2. Ransomware Attack ● Ransomware is a type of malware that targets computer systems. Its operation varies depending on the type.There are 3 main types or families of Ransomware: Crypto, Locker, and Leakware/Doxware.The Crypto family encrypts a group of files on the station; the Locker type, blocks access to the computer; whereas, the Leakware/Doxware family blocks access to the operating system and files, threatening the user with the publication of confidential information.The common denominator that the 3 families have is that the device and the information is inaccessible and to recover it, a ransom must be paid, typically in cryptocurrencies such as Bitcoin. ● According to cybersecurityventures.com: "Global Ransomware Damage Costs PredictedTo Exceed $265 Billion By 2031. Fastest growing type of cybercrime is expected to attack a business, consumer, or device every 2 seconds by 2031".
  • 3. What happened in Telefónica? ● Founded in 1924,Telefónica, S. A. is a Spanish multinational telecommunications corporation based on Madrid. It offers telephone, internet and television products and services. It is currently the fourth largest company in Europe and the thirteenth worldwide. In addition, it is listed on the Spanish stock market under the acronymTEF of the IBEX 35 stock index. ● According to Microsoft, the NSA was looking for vulnerabilities inWindows products during 2011. By 2012 they found a bug in the SMBv1 protocol ofWindows systems and developed the Eternal Blue exploit, which was stolen in 2016.This fact caused the NSA to notify Microsoft of the vulnerability in February 2017, so on March 14, 2017, the company published the security bulletin MS17-010 with CVE-2017-0145. Later, in April 2017, a group of hackers called Shadow Brokers leaked Eternal Blue which served as the basis for the worldwide ransomware attack calledWannacry. TheWannacry cyberattack started on May 12, 2017, with Spanish companies being the first victims, and specificallyTelefónica.The CDO of the organization reported via his blog that using a phishing campaign someone fromTelefónica downloaded a dropper through a link, thereby infecting his computer.The infected computer scanned the LAN for computers vulnerable to Eternal Blue in order to infect them and continue spreading. Likewise, the objective ofWannacry was to encrypt the files and not steal data.To decrypt the information, it requested a ransom of 300 dollars in Bitcoin.
  • 4. Timeline 2011: NSA was looking for vulnerabilities inWindows products during this year, according to Microsoft. 2012: NSA found a bug in several versions ofWindows and developed the Eternal Blue exploit. 2016:The Eternal Blue exploit was stolen from NSA by Shadow Brokers, a hacking group. 2017: NSA notifies Microsoft about the vulnerability in February. On March 14th, the company published the security bulletin MS17-010 with CVE-2017-0145. 2017: In April, Shadow Brokers leaked Eternal Blue. Wannacry attack started on May 12th.That day, aTelefónica employee clicked on a link in a phishing email and downloaded a dropper, thus infecting his computer and later other computers with the ransomware. 2017:Wannacry encrypted the files of hundreds of computers and to decrypt them they asked for 300 dollars in Bitcoin for each computer, which was rejected.Telefónica disconnected the equipment from a part of the LAN. Finally, the CDO announced viaTwitter that they had been affected by the malware. Wannacry ransomware attacksTelefónica 1 2 3 4 5 6
  • 5. Vulnerabilities Lack of user computer security education and a strict vulnerability management policy. Phishing Lack of education in basic computer security and in this type of attack in particular. Vulnerability and Patch Management Program Delay in the discovery of vulnerabilities and in the application of their respective patches. Systems Lack of upgrade in operating systems.
  • 6. Costs Prevention • Nearly $260,000 from repairing approximately 650 computers at an average cost of $400 each. • AlthoughWannacry did not affect its clients, there was an economic impact due to the disconnection of the personnel during the 48 hours it took to solve the incident. • Costs derived from overtime for security checks and investment in implementing additional security measures. • Reputational damage and reduced trust of customers and partners. • Education, by levels, in cybersecurity for all company workers. • Early detection. • Follow a strict vulnerability and patch management plan. • Keep operating system and all software updated and configured. • Perform regular backups and keep them isolated from the network segment. • An intelligent SOC with machine learning in order to detect anomalous behavior.