WannaCry still lies dormant on thousands of computers

Cal Jeffrey

Posts: 4,467   +1,598
Staff member
Why it matters: Even after 18 months, WannaCry still poses a significant threat to businesses worldwide. According to Kryptos Logic, over half a million computers are still infected. The ransomware has been mostly eradicated in the United States and United Kingdom, but remains a widespread problem in other parts of the world.

It has been a year and a half since the initial WannaCry ransomware outbreak, and the malware still poses a threat to thousands of computers. Recent data shows that hundreds of thousands of computers are still infected with the malicious software even though it is currently dormant.

The malware is inactive thanks to security researcher Marcus Hutchins at Kryptos Logic. Bleeping Computer notes that Hutchins found a bit of code in the ransomware that referenced an odd domain. The domain was unregistered, so he registered it only to discover that he had activated a kill switch.

WannaCry periodically pings this address. As long as the sinkholed domain is up and running the software will not encrypt files. If it were to go down, then the malware would kick in and begin causing trouble.

Kryptos Logic gave the domain over to Cloudflare for hosting as a protective measure against DDoS attacks. Cloudflare also gives them access to various metrics of the address. Kryptos Logic’s Head of Security & Threat Intelligence Research Jamie Hankins recently tweeted some of these statistics.

During one week, the kill switch domain received more than 17 million pings. These beacons come from over 630,000 unique IP addresses originating in 194 different countries. China, Indonesia, and Vietnam are the top three countries by way of infections, and nearly half the traffic to the domain is from these regions.

“The UK consists of approximately 0.15% of the total connections with the USA coming in at 1.35% for a single day's statistics,” Hankins told Bleeping Computer. “These numbers can be skewed by DHCP churn over longer time periods.”

The domain is more active on weekdays than on the weekend. This statistic was expected considering the ransomware’s primary targets would be enterprise computers. Businesses are much more likely to pay a high price for valuable files than private users.

While WannaCry remains dormant for now, Hankins warns that all it would take for the malware to rear its ugly head is an internet outage.

Kryptos Logic has a tool called TellTale, which identifies WannaCry infections. Admins can use it to look up and monitor their range of IP addresses. TellTale can spot other types of malware as well.

Permalink to story.

 
Like to hear more about TellTale's web site and services .... are they free or is there a fee?
 
Oh, that's an easy one....

You Google it!

Google: how does one remove WannaCry?

WOW, that was so easy!

Umm, tried - answers were from last year - was hoping someone smart had an easier version. Back in 2017 some folks were suggesting running 3 or 4 AVs. Is there some where that it might be just one? And it might be recommended by a solid source?

Phrases like "Anti-ransomware solutions like Malwarebytes are a reliable go-to for extra protection from unsavory software, but they’re not foolproof." do not assure me.

Rocky - out.
 
Any reputed AV (with up-to-date virus database) should be able to remove WannaCry.

Last year I used the supposedly-weak Microsoft Security Essentials to clean WannaCry when it was rampaging in my company, and it worked.

A single top-rated AV like BitDefender, TrendMicro, Kaspersky, etc. should be safe enough.
 
Remove the kill switch, that will get their attention. Hard to believe they haven't dealt with it already. Force their hand I say....
 
Remove the kill switch, that will get their attention. Hard to believe they haven't dealt with it already. Force their hand I say....
Remove the kill switch, which keeps it contained, and you set off the bomb. Have you ever seen a movie where a crazed maniac is pressing a button on a kill switch? Should he let go it makes the vest go boom.
 
Back