SlideShare una empresa de Scribd logo
Case Study:Wannacry
Ransomware attacks
Telefónica
Sergio Renteria Nuñez
Ransomware
Attack
● Ransomware is a type of malware that targets computer systems. Its
operation varies depending on the type.There are 3 main types or families
of Ransomware: Crypto, Locker, and Leakware/Doxware.The Crypto family
encrypts a group of files on the station; the Locker type, blocks access to
the computer; whereas, the Leakware/Doxware family blocks access to the
operating system and files, threatening the user with the publication of
confidential information.The common denominator that the 3 families
have is that the device and the information is inaccessible and to recover it,
a ransom must be paid, typically in cryptocurrencies such as Bitcoin.
● According to cybersecurityventures.com: "Global Ransomware Damage
Costs PredictedTo Exceed $265 Billion By 2031.
Fastest growing type of cybercrime is expected to attack a business,
consumer, or device every 2 seconds by 2031".
What
happened in
Telefónica?
● Founded in 1924,Telefónica, S. A. is a Spanish multinational telecommunications
corporation based on Madrid. It offers telephone, internet and television products and
services. It is currently the fourth largest company in Europe and the thirteenth
worldwide. In addition, it is listed on the Spanish stock market under the acronymTEF
of the IBEX 35 stock index.
● According to Microsoft, the NSA was looking for vulnerabilities inWindows products
during 2011. By 2012 they found a bug in the SMBv1 protocol ofWindows systems and
developed the Eternal Blue exploit, which was stolen in 2016.This fact caused the NSA
to notify Microsoft of the vulnerability in February 2017, so on March 14, 2017, the
company published the security bulletin MS17-010 with CVE-2017-0145. Later, in April
2017, a group of hackers called Shadow Brokers leaked Eternal Blue which served as the
basis for the worldwide ransomware attack calledWannacry.
TheWannacry cyberattack started on May 12, 2017, with Spanish companies being the
first victims, and specificallyTelefónica.The CDO of the organization reported via his
blog that using a phishing campaign someone fromTelefónica downloaded a dropper
through a link, thereby infecting his computer.The infected computer scanned the LAN
for computers vulnerable to Eternal Blue in order to infect them and continue
spreading. Likewise, the objective ofWannacry was to encrypt the files and not steal
data.To decrypt the information, it requested a ransom of 300 dollars in Bitcoin.
Timeline
2011: NSA was looking for vulnerabilities inWindows products
during this year, according to Microsoft.
2012: NSA found a bug in several versions ofWindows and
developed the Eternal Blue exploit.
2016:The Eternal Blue exploit was stolen from NSA by Shadow
Brokers, a hacking group.
2017: NSA notifies Microsoft about the vulnerability in February. On
March 14th, the company published the security bulletin
MS17-010 with CVE-2017-0145.
2017: In April, Shadow Brokers leaked Eternal Blue.
Wannacry attack started on May 12th.That day, aTelefónica
employee clicked on a link in a phishing email and
downloaded a dropper, thus infecting his computer and later
other computers with the ransomware.
2017:Wannacry encrypted the files of hundreds of computers and
to decrypt them they asked for 300 dollars in Bitcoin for each
computer, which was rejected.Telefónica disconnected the equipment from a
part of the LAN. Finally, the CDO announced viaTwitter that they had been
affected by the malware.
Wannacry ransomware
attacksTelefónica
1
2
3
4
5
6
Vulnerabilities
Lack of user
computer security
education and a strict
vulnerability
management policy.
Phishing
Lack of education in basic
computer security and in
this type of attack in
particular.
Vulnerability and Patch
Management Program
Delay in the discovery of
vulnerabilities and in the
application of their
respective patches.
Systems
Lack of upgrade in
operating systems.
Costs Prevention
• Nearly $260,000 from repairing approximately
650 computers at an average cost of $400 each.
• AlthoughWannacry did not affect its clients,
there was an economic impact due to the
disconnection of the personnel during the 48
hours it took to solve the incident.
• Costs derived from overtime for security checks
and investment in implementing additional
security measures.
• Reputational damage and reduced trust of
customers and partners.
• Education, by levels, in cybersecurity for all
company workers.
• Early detection.
• Follow a strict vulnerability and patch
management plan.
• Keep operating system and all software updated
and configured.
• Perform regular backups and keep them isolated
from the network segment.
• An intelligent SOC with machine learning in order
to detect anomalous behavior.

Más contenido relacionado

Similar a Case Study: Wannacry Ransomware attacks Telefónica

Identify one cyberattack that occurred in the last 2 years. What cau.pdf
Identify one cyberattack that occurred in the last 2 years. What cau.pdfIdentify one cyberattack that occurred in the last 2 years. What cau.pdf
Identify one cyberattack that occurred in the last 2 years. What cau.pdf
fatoryoutlets
 
RIFDHY RM ( Cybersecurity ).pdf
RIFDHY RM ( Cybersecurity ).pdfRIFDHY RM ( Cybersecurity ).pdf
RIFDHY RM ( Cybersecurity ).pdf
RifDhy22
 
Ransomware
RansomwareRansomware
Ransomware
Chaitali Sharma
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
HackIT Ukraine
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
aravindanvaithilinga
 
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About RansomwareWhat Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
MavrickHost - Reliable Hosting Partner
 
Escan advisory wannacry ransomware
Escan advisory wannacry ransomwareEscan advisory wannacry ransomware
Escan advisory wannacry ransomware
MicroWorld Software Services Pvt Ltd
 
A comprehensive survey ransomware attacks prevention, monitoring and damage c...
A comprehensive survey ransomware attacks prevention, monitoring and damage c...A comprehensive survey ransomware attacks prevention, monitoring and damage c...
A comprehensive survey ransomware attacks prevention, monitoring and damage c...
RSIS International
 
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
AshishDPatel1
 
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
RSIS International
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
Shreedeep Rayamajhi
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
write12
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
bkbk37
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimes
Souman Guha
 
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Jay Beale
 
News Bytes
News BytesNews Bytes
News Bytes
Megha Sahu
 
MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence
Cyphort
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
Diego Souza
 
HR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataHR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company Data
Parsons Behle & Latimer
 
Combating RANSOMWare
Combating RANSOMWareCombating RANSOMWare
Combating RANSOMWare
Umer Saeed
 

Similar a Case Study: Wannacry Ransomware attacks Telefónica (20)

Identify one cyberattack that occurred in the last 2 years. What cau.pdf
Identify one cyberattack that occurred in the last 2 years. What cau.pdfIdentify one cyberattack that occurred in the last 2 years. What cau.pdf
Identify one cyberattack that occurred in the last 2 years. What cau.pdf
 
RIFDHY RM ( Cybersecurity ).pdf
RIFDHY RM ( Cybersecurity ).pdfRIFDHY RM ( Cybersecurity ).pdf
RIFDHY RM ( Cybersecurity ).pdf
 
Ransomware
RansomwareRansomware
Ransomware
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About RansomwareWhat Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
 
Escan advisory wannacry ransomware
Escan advisory wannacry ransomwareEscan advisory wannacry ransomware
Escan advisory wannacry ransomware
 
A comprehensive survey ransomware attacks prevention, monitoring and damage c...
A comprehensive survey ransomware attacks prevention, monitoring and damage c...A comprehensive survey ransomware attacks prevention, monitoring and damage c...
A comprehensive survey ransomware attacks prevention, monitoring and damage c...
 
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
 
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimes
 
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
 
News Bytes
News BytesNews Bytes
News Bytes
 
MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
 
HR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataHR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company Data
 
Combating RANSOMWare
Combating RANSOMWareCombating RANSOMWare
Combating RANSOMWare
 

Último

原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
SOCRadar
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
Alberto Brandolini
 
Requirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional SafetyRequirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional Safety
Ayan Halder
 
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
mz5nrf0n
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
Peter Muessig
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
dakas1
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
VALiNTRY360
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
ToXSL Technologies
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
GohKiangHock
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
Hornet Dynamics
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
What next after learning python programming basics
What next after learning python programming basicsWhat next after learning python programming basics
What next after learning python programming basics
Rakesh Kumar R
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
Lecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptxLecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptx
TaghreedAltamimi
 
Mobile app Development Services | Drona Infotech
Mobile app Development Services  | Drona InfotechMobile app Development Services  | Drona Infotech
Mobile app Development Services | Drona Infotech
Drona Infotech
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 

Último (20)

原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
 
Requirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional SafetyRequirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional Safety
 
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
What next after learning python programming basics
What next after learning python programming basicsWhat next after learning python programming basics
What next after learning python programming basics
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
Lecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptxLecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptx
 
Mobile app Development Services | Drona Infotech
Mobile app Development Services  | Drona InfotechMobile app Development Services  | Drona Infotech
Mobile app Development Services | Drona Infotech
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 

Case Study: Wannacry Ransomware attacks Telefónica

  • 2. Ransomware Attack ● Ransomware is a type of malware that targets computer systems. Its operation varies depending on the type.There are 3 main types or families of Ransomware: Crypto, Locker, and Leakware/Doxware.The Crypto family encrypts a group of files on the station; the Locker type, blocks access to the computer; whereas, the Leakware/Doxware family blocks access to the operating system and files, threatening the user with the publication of confidential information.The common denominator that the 3 families have is that the device and the information is inaccessible and to recover it, a ransom must be paid, typically in cryptocurrencies such as Bitcoin. ● According to cybersecurityventures.com: "Global Ransomware Damage Costs PredictedTo Exceed $265 Billion By 2031. Fastest growing type of cybercrime is expected to attack a business, consumer, or device every 2 seconds by 2031".
  • 3. What happened in Telefónica? ● Founded in 1924,Telefónica, S. A. is a Spanish multinational telecommunications corporation based on Madrid. It offers telephone, internet and television products and services. It is currently the fourth largest company in Europe and the thirteenth worldwide. In addition, it is listed on the Spanish stock market under the acronymTEF of the IBEX 35 stock index. ● According to Microsoft, the NSA was looking for vulnerabilities inWindows products during 2011. By 2012 they found a bug in the SMBv1 protocol ofWindows systems and developed the Eternal Blue exploit, which was stolen in 2016.This fact caused the NSA to notify Microsoft of the vulnerability in February 2017, so on March 14, 2017, the company published the security bulletin MS17-010 with CVE-2017-0145. Later, in April 2017, a group of hackers called Shadow Brokers leaked Eternal Blue which served as the basis for the worldwide ransomware attack calledWannacry. TheWannacry cyberattack started on May 12, 2017, with Spanish companies being the first victims, and specificallyTelefónica.The CDO of the organization reported via his blog that using a phishing campaign someone fromTelefónica downloaded a dropper through a link, thereby infecting his computer.The infected computer scanned the LAN for computers vulnerable to Eternal Blue in order to infect them and continue spreading. Likewise, the objective ofWannacry was to encrypt the files and not steal data.To decrypt the information, it requested a ransom of 300 dollars in Bitcoin.
  • 4. Timeline 2011: NSA was looking for vulnerabilities inWindows products during this year, according to Microsoft. 2012: NSA found a bug in several versions ofWindows and developed the Eternal Blue exploit. 2016:The Eternal Blue exploit was stolen from NSA by Shadow Brokers, a hacking group. 2017: NSA notifies Microsoft about the vulnerability in February. On March 14th, the company published the security bulletin MS17-010 with CVE-2017-0145. 2017: In April, Shadow Brokers leaked Eternal Blue. Wannacry attack started on May 12th.That day, aTelefónica employee clicked on a link in a phishing email and downloaded a dropper, thus infecting his computer and later other computers with the ransomware. 2017:Wannacry encrypted the files of hundreds of computers and to decrypt them they asked for 300 dollars in Bitcoin for each computer, which was rejected.Telefónica disconnected the equipment from a part of the LAN. Finally, the CDO announced viaTwitter that they had been affected by the malware. Wannacry ransomware attacksTelefónica 1 2 3 4 5 6
  • 5. Vulnerabilities Lack of user computer security education and a strict vulnerability management policy. Phishing Lack of education in basic computer security and in this type of attack in particular. Vulnerability and Patch Management Program Delay in the discovery of vulnerabilities and in the application of their respective patches. Systems Lack of upgrade in operating systems.
  • 6. Costs Prevention • Nearly $260,000 from repairing approximately 650 computers at an average cost of $400 each. • AlthoughWannacry did not affect its clients, there was an economic impact due to the disconnection of the personnel during the 48 hours it took to solve the incident. • Costs derived from overtime for security checks and investment in implementing additional security measures. • Reputational damage and reduced trust of customers and partners. • Education, by levels, in cybersecurity for all company workers. • Early detection. • Follow a strict vulnerability and patch management plan. • Keep operating system and all software updated and configured. • Perform regular backups and keep them isolated from the network segment. • An intelligent SOC with machine learning in order to detect anomalous behavior.