SlideShare a Scribd company logo
1 of 6
Case Study:Wannacry
Ransomware attacks
Telefónica
Sergio Renteria Nuñez
Ransomware
Attack
● Ransomware is a type of malware that targets computer systems. Its
operation varies depending on the type.There are 3 main types or families
of Ransomware: Crypto, Locker, and Leakware/Doxware.The Crypto family
encrypts a group of files on the station; the Locker type, blocks access to
the computer; whereas, the Leakware/Doxware family blocks access to the
operating system and files, threatening the user with the publication of
confidential information.The common denominator that the 3 families
have is that the device and the information is inaccessible and to recover it,
a ransom must be paid, typically in cryptocurrencies such as Bitcoin.
● According to cybersecurityventures.com: "Global Ransomware Damage
Costs PredictedTo Exceed $265 Billion By 2031.
Fastest growing type of cybercrime is expected to attack a business,
consumer, or device every 2 seconds by 2031".
What
happened in
Telefónica?
● Founded in 1924,Telefónica, S. A. is a Spanish multinational telecommunications
corporation based on Madrid. It offers telephone, internet and television products and
services. It is currently the fourth largest company in Europe and the thirteenth
worldwide. In addition, it is listed on the Spanish stock market under the acronymTEF
of the IBEX 35 stock index.
● According to Microsoft, the NSA was looking for vulnerabilities inWindows products
during 2011. By 2012 they found a bug in the SMBv1 protocol ofWindows systems and
developed the Eternal Blue exploit, which was stolen in 2016.This fact caused the NSA
to notify Microsoft of the vulnerability in February 2017, so on March 14, 2017, the
company published the security bulletin MS17-010 with CVE-2017-0145. Later, in April
2017, a group of hackers called Shadow Brokers leaked Eternal Blue which served as the
basis for the worldwide ransomware attack calledWannacry.
TheWannacry cyberattack started on May 12, 2017, with Spanish companies being the
first victims, and specificallyTelefónica.The CDO of the organization reported via his
blog that using a phishing campaign someone fromTelefónica downloaded a dropper
through a link, thereby infecting his computer.The infected computer scanned the LAN
for computers vulnerable to Eternal Blue in order to infect them and continue
spreading. Likewise, the objective ofWannacry was to encrypt the files and not steal
data.To decrypt the information, it requested a ransom of 300 dollars in Bitcoin.
Timeline
2011: NSA was looking for vulnerabilities inWindows products
during this year, according to Microsoft.
2012: NSA found a bug in several versions ofWindows and
developed the Eternal Blue exploit.
2016:The Eternal Blue exploit was stolen from NSA by Shadow
Brokers, a hacking group.
2017: NSA notifies Microsoft about the vulnerability in February. On
March 14th, the company published the security bulletin
MS17-010 with CVE-2017-0145.
2017: In April, Shadow Brokers leaked Eternal Blue.
Wannacry attack started on May 12th.That day, aTelefónica
employee clicked on a link in a phishing email and
downloaded a dropper, thus infecting his computer and later
other computers with the ransomware.
2017:Wannacry encrypted the files of hundreds of computers and
to decrypt them they asked for 300 dollars in Bitcoin for each
computer, which was rejected.Telefónica disconnected the equipment from a
part of the LAN. Finally, the CDO announced viaTwitter that they had been
affected by the malware.
Wannacry ransomware
attacksTelefónica
1
2
3
4
5
6
Vulnerabilities
Lack of user
computer security
education and a strict
vulnerability
management policy.
Phishing
Lack of education in basic
computer security and in
this type of attack in
particular.
Vulnerability and Patch
Management Program
Delay in the discovery of
vulnerabilities and in the
application of their
respective patches.
Systems
Lack of upgrade in
operating systems.
Costs Prevention
• Nearly $260,000 from repairing approximately
650 computers at an average cost of $400 each.
• AlthoughWannacry did not affect its clients,
there was an economic impact due to the
disconnection of the personnel during the 48
hours it took to solve the incident.
• Costs derived from overtime for security checks
and investment in implementing additional
security measures.
• Reputational damage and reduced trust of
customers and partners.
• Education, by levels, in cybersecurity for all
company workers.
• Early detection.
• Follow a strict vulnerability and patch
management plan.
• Keep operating system and all software updated
and configured.
• Perform regular backups and keep them isolated
from the network segment.
• An intelligent SOC with machine learning in order
to detect anomalous behavior.

More Related Content

Similar to Case Study: Wannacry Ransomware attacks Telefónica

Identify one cyberattack that occurred in the last 2 years. What cau.pdf
Identify one cyberattack that occurred in the last 2 years. What cau.pdfIdentify one cyberattack that occurred in the last 2 years. What cau.pdf
Identify one cyberattack that occurred in the last 2 years. What cau.pdffatoryoutlets
 
RIFDHY RM ( Cybersecurity ).pdf
RIFDHY RM ( Cybersecurity ).pdfRIFDHY RM ( Cybersecurity ).pdf
RIFDHY RM ( Cybersecurity ).pdfRifDhy22
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...HackIT Ukraine
 
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...AshishDPatel1
 
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...RSIS International
 
A comprehensive survey ransomware attacks prevention, monitoring and damage c...
A comprehensive survey ransomware attacks prevention, monitoring and damage c...A comprehensive survey ransomware attacks prevention, monitoring and damage c...
A comprehensive survey ransomware attacks prevention, monitoring and damage c...RSIS International
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trendsShreedeep Rayamajhi
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxbkbk37
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxwrite12
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesSouman Guha
 
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...Jay Beale
 
MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence Cyphort
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up bookDiego Souza
 
HR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataHR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataParsons Behle & Latimer
 
Combating RANSOMWare
Combating RANSOMWareCombating RANSOMWare
Combating RANSOMWareUmer Saeed
 

Similar to Case Study: Wannacry Ransomware attacks Telefónica (20)

Identify one cyberattack that occurred in the last 2 years. What cau.pdf
Identify one cyberattack that occurred in the last 2 years. What cau.pdfIdentify one cyberattack that occurred in the last 2 years. What cau.pdf
Identify one cyberattack that occurred in the last 2 years. What cau.pdf
 
RIFDHY RM ( Cybersecurity ).pdf
RIFDHY RM ( Cybersecurity ).pdfRIFDHY RM ( Cybersecurity ).pdf
RIFDHY RM ( Cybersecurity ).pdf
 
Ransomware
RansomwareRansomware
Ransomware
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About RansomwareWhat Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
 
Escan advisory wannacry ransomware
Escan advisory wannacry ransomwareEscan advisory wannacry ransomware
Escan advisory wannacry ransomware
 
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
 
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
 
A comprehensive survey ransomware attacks prevention, monitoring and damage c...
A comprehensive survey ransomware attacks prevention, monitoring and damage c...A comprehensive survey ransomware attacks prevention, monitoring and damage c...
A comprehensive survey ransomware attacks prevention, monitoring and damage c...
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimes
 
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
 
News Bytes
News BytesNews Bytes
News Bytes
 
MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
 
HR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataHR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company Data
 
Combating RANSOMWare
Combating RANSOMWareCombating RANSOMWare
Combating RANSOMWare
 

Recently uploaded

The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutionsmonugehlot87
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?Watsoo Telematics
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 

Recently uploaded (20)

The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
buds n tech IT solutions
buds n  tech IT                solutionsbuds n  tech IT                solutions
buds n tech IT solutions
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 

Case Study: Wannacry Ransomware attacks Telefónica

  • 2. Ransomware Attack ● Ransomware is a type of malware that targets computer systems. Its operation varies depending on the type.There are 3 main types or families of Ransomware: Crypto, Locker, and Leakware/Doxware.The Crypto family encrypts a group of files on the station; the Locker type, blocks access to the computer; whereas, the Leakware/Doxware family blocks access to the operating system and files, threatening the user with the publication of confidential information.The common denominator that the 3 families have is that the device and the information is inaccessible and to recover it, a ransom must be paid, typically in cryptocurrencies such as Bitcoin. ● According to cybersecurityventures.com: "Global Ransomware Damage Costs PredictedTo Exceed $265 Billion By 2031. Fastest growing type of cybercrime is expected to attack a business, consumer, or device every 2 seconds by 2031".
  • 3. What happened in Telefónica? ● Founded in 1924,Telefónica, S. A. is a Spanish multinational telecommunications corporation based on Madrid. It offers telephone, internet and television products and services. It is currently the fourth largest company in Europe and the thirteenth worldwide. In addition, it is listed on the Spanish stock market under the acronymTEF of the IBEX 35 stock index. ● According to Microsoft, the NSA was looking for vulnerabilities inWindows products during 2011. By 2012 they found a bug in the SMBv1 protocol ofWindows systems and developed the Eternal Blue exploit, which was stolen in 2016.This fact caused the NSA to notify Microsoft of the vulnerability in February 2017, so on March 14, 2017, the company published the security bulletin MS17-010 with CVE-2017-0145. Later, in April 2017, a group of hackers called Shadow Brokers leaked Eternal Blue which served as the basis for the worldwide ransomware attack calledWannacry. TheWannacry cyberattack started on May 12, 2017, with Spanish companies being the first victims, and specificallyTelefónica.The CDO of the organization reported via his blog that using a phishing campaign someone fromTelefónica downloaded a dropper through a link, thereby infecting his computer.The infected computer scanned the LAN for computers vulnerable to Eternal Blue in order to infect them and continue spreading. Likewise, the objective ofWannacry was to encrypt the files and not steal data.To decrypt the information, it requested a ransom of 300 dollars in Bitcoin.
  • 4. Timeline 2011: NSA was looking for vulnerabilities inWindows products during this year, according to Microsoft. 2012: NSA found a bug in several versions ofWindows and developed the Eternal Blue exploit. 2016:The Eternal Blue exploit was stolen from NSA by Shadow Brokers, a hacking group. 2017: NSA notifies Microsoft about the vulnerability in February. On March 14th, the company published the security bulletin MS17-010 with CVE-2017-0145. 2017: In April, Shadow Brokers leaked Eternal Blue. Wannacry attack started on May 12th.That day, aTelefónica employee clicked on a link in a phishing email and downloaded a dropper, thus infecting his computer and later other computers with the ransomware. 2017:Wannacry encrypted the files of hundreds of computers and to decrypt them they asked for 300 dollars in Bitcoin for each computer, which was rejected.Telefónica disconnected the equipment from a part of the LAN. Finally, the CDO announced viaTwitter that they had been affected by the malware. Wannacry ransomware attacksTelefónica 1 2 3 4 5 6
  • 5. Vulnerabilities Lack of user computer security education and a strict vulnerability management policy. Phishing Lack of education in basic computer security and in this type of attack in particular. Vulnerability and Patch Management Program Delay in the discovery of vulnerabilities and in the application of their respective patches. Systems Lack of upgrade in operating systems.
  • 6. Costs Prevention • Nearly $260,000 from repairing approximately 650 computers at an average cost of $400 each. • AlthoughWannacry did not affect its clients, there was an economic impact due to the disconnection of the personnel during the 48 hours it took to solve the incident. • Costs derived from overtime for security checks and investment in implementing additional security measures. • Reputational damage and reduced trust of customers and partners. • Education, by levels, in cybersecurity for all company workers. • Early detection. • Follow a strict vulnerability and patch management plan. • Keep operating system and all software updated and configured. • Perform regular backups and keep them isolated from the network segment. • An intelligent SOC with machine learning in order to detect anomalous behavior.