Partner Program Overview
Designed to deliver unparalleled customer value and accelerated mutual growth by harnessing partner expertise and ColorTokens cybersecurity technology.
Learn MoreInfrastructure
Quick Links
Case Study
Designed to deliver unparalleled customer value and accelerated mutual growth by harnessing partner expertise and ColorTokens cybersecurity technology.
Learn MoreFeatured Topic
Newsletter
It has been a little over a year since WannaCry wreaked havoc on the internet in May 2017. One of the organizations that was heavily affected by this malware attack was the National Health Service (NHS), UK. Last week, the NHS came out with a report that pinned the total cost of the damage and subsequent IT expenses at £92 million ($120 million).
Cyber attacks have become a regular affair across the world, but what stood out in this case, was the scale of the attack. WannaCry infected 200,000 computers by locking out users and displaying a demand for a Bitcoin ransom. The virus also caused over 19,000 appointments to be cancelled over a period of one week as it spread across 45 NHS organizations including 37 trusts, affecting a total of 603 primary care centers.
WannaCry infected personal computers by exploiting the Windows implementation of the Server Message Block (SMB) protocol. Ironically, this vulnerability was reported to be first discovered by the U.S. National Security Agency, who developed a code called EternalBlue to exploit it. Unfortunately, this code was stolen and used by hackers to create WannaCry.
Though Microsoft had released a patch to prevent WannaCry-like attacks in March 2017, many systems remained unpatched when the outbreak took place in May. The patch was also exclusively available to the versions of Windows that Microsoft supported. Systems running on Windows XP were left completely excluded.
The NHS Digital had issued a warning to all organizations to patch their systems against WannaCry, but there weren’t any compliance mechanisms in place to verify if systems were patched. This resulted in a widespread infection, causing a major financial setback to the NHS and disruption of several critical healthcare services.
When we look back today, it is easy to draw the conclusion that an outbreak like WannaCry could have been avoided if all the NHS organizations had complied with the recommended upgrades and patches. However, this would be a very simplistic way to assess the entire WannaCry episode. Here’s why.
Self-spreading malware like WannaCry succeeds because of vulnerabilities in operating systems. The ground reality is that many organizations still run their endpoint on Windows XP, which Microsoft no longer supports. This holds true for special purpose systems like banking ATMs, Point of Sale (POS) systems at retail outlets, airport check-in counters, etc. Upgradation to a new OS is a huge capital and operational expense, which is why most organizations settle for traditional antivirus protection.
Vulnerabilities in the OS are not always discovered by OEMs in time. Even if they are, creating a patch, testing, and deploying it could take months and sometimes even years. As attacks have been increasing in frequency and sophistication, waiting for patches is simply not practical for large enterprises. In the case of WannaCry, the Windows patch was released two months before the NHS was attacked. However, lack of network visibility and absence of strict compliance requirements meant that the malware could spread unchecked at a great speed.
When it comes to endpoint security, antivirus/anti-malware is pitted as the optimum protection that your computer needs. However, signature-based antivirus software relies on the ‘known bad ‘ (signatures or behaviors) and is not capable of preventing unknown threats or zero-day attacks. Organizations need to shift from reactive security solutions and start taking a proactive approach to securing their network and endpoints. It is also important to note that any change in the security posture is going to take time – a situation which hackers use to their advantage.
Vulnerable endpoints are soft targets for hackers to not only disrupt network communications but also to move laterally and gain access to sensitive data that is spread across different servers. Like the WannaCry attack on NHS demonstrates, waiting for patches and depending on traditional antivirus software is not a reliable strategy anymore. Enterprises need to switch to a proactive security approach.
4 Aspects to Look for When Choosing a Proactive Endpoint Security Solution
See how ColorTokens can help proactively protect your company’s endpoints from cyber threats.
By submitting this form, you agree to ColorTokens
Terms of Service and
Privacy Policy