Security

Analysis of Australia’s exposure to WannaCry

Fields marked with an * are required

Subscribe to our newsletter

Over the weekend of 13 & 14 May, hundreds of thousands of computer systems at government agencies, hospitals and companies  in dozens of countries were affected by the malicious WannaCry cyber attack, which locked computers and held files to ransom. Australia is among the countries affected.

Here, Edward Farrell, Director & Principal Consultant at Mercury Information Security Services provides an analysis of Australia’s exposure and response to this ransomware attack.

Exploitation of the vulnerability is dependent upon the availability of windows SMB (port 445) and a failure to patch MS17-010. Given this fact, there are two attack vectors:

  1. social engineering or phishing emails, which would occur regardless.
  2. public exposure of the identified port to the internet which is accessible without authentication, which this analysis considers.

Late Sunday/Early Monday (14 &1 5 May) our team started planning and preparing for analysis of the Australian response to patching MS17-010. The purpose of this was to gauge the number open systems that could be readily exploited and observe patching behaviours. Over the past few days, we’ve identified ~3000 likely targets in Australia (that is SMB exposed to the internet and running windows in Australia). An exploration of these (not exploitation) identified the following statistics:

 

A few points/observations from this:

  • the list has been expanding/contracting over the past few 72 hours.
  • Last count there were around 229 in total that were exposed at some period during our analysis.
  • This does not include hosts that are blocked or have some other mitigation in place.

I also identified that Shodan has 32 of this count that it has identified as having been hit with doublepulsar last month.

Information in this article was first published in articles by Edward Farrell on LinkedIn and has been reproduced in this story on the AARNet News site with the permission of the author.

View Edward Farrell’s WannaCry analysis updates published on LinkedIn

 


Related Stories

K-12 Schools / Security

Apr 5, 2017

Cybersecurity tips from machine learning researcher

Machine learning is offering insights into the behaviour of malicious bots by tracking them as they evolve over time to evade detection. It’s a powerful tool, but it’s not the only one needed to keep students safe in increasingly online learning environment explains Miranda Mowbray, a researcher in machine learning...

Security

Mar 20, 2017

How to respond to a ransomware attack?

With an increasing number of universities around the world reporting ransomware attacks and the threat showing no signs of going away, clear policies on cybersecurity and training for staff are the best form of defence for the Australian research and education community. In a previous post, we provided information on...

Security

Feb 7, 2017

How to protect your university from ransomware attacks?

With an increasing number of universities around the world reporting ransomware attacks and the threat showing no signs of going away, clear policies on cybersecurity and training for staff are the best form of defence for the Australian research and education community. By Louise Schuster, AARNet’s Director, Cyber Security During our...