WannaCry happened due to slow patching

The fact about security updates is that organization will always lag behind to update their infrastructure when patches are released. Even so, too many organizations are taking too long to test and schedule, and they're paying the price.

Now, that WannaCry has created havoc across the world locking thousand of systems literally holding their operations. Organization from hospital to telecommunication, Auditing, Manufacturing have all got their computer locked by WannaCry.

Wannacry


This ransomware is a made in a way that spreads in your network using the flaw of Windows Server Message Block protocol, which was last patched by Microsoft in March 2017. ExternalBlue use this to exploit the flaw in Windows as part of hacking, which was dumped by the Shadow Brokers group.
 

Microsoft had last released the patch for Windows 10, but left out the earlier Windows server 2003 at risk. After "Wanna Cry" Microsoft had released updates for all the versions. Windows Server 2003 is already facing extinction, but some organization is still using this old system, which has already past the expiration date. An organization that is in Healthcare service need to be careful because many of this system cannot be updated to comply with the latest system.

Some system that WannaCry has seeped into are running on outdated OS, which anyway can't be fixed. IT teams in large organization are saying that it will take around 100-days to patch critical vulnerabilities. This gives the criminals the time to negotiate with the victim and extort money.

Why WannaCry is designed in such a way that their creators can quickly create a dangerous worm by incorporating the EternalBlue code into ransomware. While the news we hear is about attacks using zero-day flaws, but the network administrator are looking to stop it from entering their system, because it spreads fast. The specialty of Internet worms spread the infection and are capable to find other vulnerable hosts to infect in the same network. At this situation any administrator will only want to see if he can contain the malware from spreading even if it means compromising a single machine. This way he can save a large network from getting infected. Otherwise its know factor how much damage a ransomware can do.


Update Patch

Organization need to work smarter and faster if they want to test and make changes when the patches are released by the enterprise. The business operation should not be interrupted as and when they schedule the update shared resources like file servers. IT experts suggest that you can have parallel system working to solve this, a kind of redundancy, so that one system is patching and other system handling the load. This way your daily work is not interrupted. The other solution most viable solution is to have "Automatic Containment Technology" the only technology that brings battle tested solution. The threat containment solutions provide total protection against zero-day threats while having no impact on end-user experience or workflows. All untrusted processes and applications are automatically contained in a secure environment, allowing safe applications the freedom to run while denying malware the system access they require to deliver their payloads.

More worms in waiting

Slow patching

A lot of patches have been released recently, which means IT security are expecting more worms. The odds are high and IT team in all organizations are shielding their infrastructure with patches. Now that it is clear that WannaCry is using Shadow Brokers implants, the other criminals will be digging too deep to analyze the dump create more virus.

Accordingly to Kapil Khot of Qualys- The another potential exploit from this dump is Pass Freely, it has the capacity to bypass Oracle database authentication. The exploit patches the Oracle process (oracle.exe, oracle80.exe and oracle73.exe) in-memory to allow unauthenticated sessions to Oracle instance. The company's researchers were able to use the exploit to compromise Oracle version 11.2.0.1.0 64-bit on Windows Server 2008 R2 and access the database.

Comments

Popular posts from this blog

PoS Hacker Awarded 27 Year Jail Sentence by US Court

Comparison of Remote Access Software Tools