Interactive Learning Module | May 2017 Global Cyber Incident
200,000+
Infected Systems
150+
Countries Affected
$4-8B
Economic Impact
May 12, 2017
Attack Date
Overview: WannaCry Ransomware Attack
Attack Summary: WannaCry (also known as WannaCrypt, WanaCrypt0r 2.0, and Wana Decrypt0r 2.0) was a worldwide cyberattack that occurred in May 2017, leveraging the EternalBlue exploit to propagate ransomware across networks. The attack infected over 200,000 computers across 150 countries in a matter of hours, causing billions of dollars in damages.
Quick Statistics
Infection Scale: 200,000+ computers in 150+ countries
Duration: Peak activity May 12-15, 2017
Ransom Demand: $300-$600 USD in Bitcoin per infected system
Total Ransom Collected: Approximately $140,000 USD
Microsoft releases security bulletin MS17-010 patching the EternalBlue vulnerability (CVE-2017-0144) for supported Windows versions.
April 14, 2017
The Shadow Brokers hacker group leaks NSA exploit tools including EternalBlue, DoublePulsar, and other SMB-targeting exploits.
May 12, 2017 - 07:44 UTC
First WannaCry infections detected in Asia, rapidly spreading westward. The attack begins affecting Spain's Telefónica and other major organizations.
May 12, 2017 - Afternoon
UK's National Health Service (NHS) severely impacted with 80 NHS trusts affected, forcing ambulance diversions and cancellation of thousands of appointments and operations.
May 12, 2017 - 15:03 UTC
Marcus Hutchins (MalwareTech), a 22-year-old British security researcher, discovers and registers the unregistered kill switch domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com), significantly slowing the spread.
May 13, 2017
Microsoft takes unprecedented step of releasing emergency patches (MS17-010) for unsupported legacy systems including Windows XP, Windows 8, and Windows Server 2003.
May 14, 2017
WannaCry variant 2.0 detected without the kill switch domain check, though it spreads less effectively than the original variant.
May 15, 2017
Infection rate drops significantly as organizations implement patches and network segmentation. Global coordination of incident response begins.
December 18, 2017
United States, United Kingdom, Australia, Canada, New Zealand, and Japan formally attribute the attack to North Korea's Lazarus Group.
September 2018
U.S. Department of Justice charges Park Jin Hyok, a North Korean programmer, for his role in the WannaCry attack and other cybercrimes.
WannaCry combined worm-like propagation capabilities with ransomware payload delivery, making it particularly devastating. The attack chain consisted of:
Initial Infection: Exploitation of unpatched SMBv1 vulnerabilities (CVE-2017-0144) using the EternalBlue exploit leaked from NSA tools
Backdoor Installation: Deployment of DoublePulsar backdoor for persistent access
Payload Execution: Download and execution of WannaCry ransomware dropper
Lateral Movement: Autonomous scanning of networks for vulnerable systems, creating worm-like propagation
Encryption: File encryption using AES-128 and RSA-2048 cryptography
Ransom Demand: Display of ransom note demanding Bitcoin payment with countdown timer
The malware checked for the existence of a specific unregistered domain before proceeding with encryption. This was likely intended as an anti-sandbox mechanism but inadvertently created a kill switch when the domain was registered by security researchers.
Target Organizations and Affected Sectors
Important Note: WannaCry was an indiscriminate attack that did not specifically target particular organizations or sectors. Instead, it exploited a widespread vulnerability, affecting any unpatched Windows system with SMBv1 enabled and accessible. However, certain sectors were disproportionately impacted due to legacy systems and operational constraints.
Most Severely Affected Sectors
Global Impact Distribution
Heavily Affected (10,000+ infections)
Moderately Affected (1,000-10,000 infections)
Less Affected (<1,000 infections)
Healthcare Sector
United Kingdom - National Health Service (NHS)
Scope: 80 out of 236 NHS trusts affected, plus 603 primary care and other NHS organizations
Why Affected: Many NHS systems ran Windows XP (end-of-life since April 2014) and Windows 7 without recent patches due to compatibility concerns with critical medical equipment and software
Notable Incidents: East and North Hertfordshire NHS Trust had to divert emergency patients; patients turned away from A&E departments
Recovery Time: Several days to weeks for full restoration of services
Other Healthcare Organizations Affected:
Bayer AG (Germany) - pharmaceutical and medical device manufacturer
Multiple hospitals in Romania, Indonesia, and other countries
Various healthcare providers across Asia, including several hospitals in South Korea
Telecommunications
Telefónica (Spain): One of the first major victims, with internal systems encrypted. Employees sent home as IT staff worked to contain the spread.
Megafon (Russia): Major telecommunications provider affected
Deutsche Telekom (Germany): Customer routers affected, though impact less severe
Transportation and Logistics
Deutsche Bahn (German Rail): Display boards and ticketing systems affected at multiple stations
FedEx: Windows subsidiary TNT Express severely impacted with operational disruptions lasting weeks
Renault (France): Manufacturing facilities forced to halt production temporarily
Nissan (UK): Manufacturing plant in Sunderland forced to stop production
Government and Public Sector
Russian Ministry of Interior: Approximately 1,000 computers affected
Chinese Universities: Multiple institutions including educational networks affected
Spain's Infrastructure Ministry (Fomento): Some systems impacted
Andhra Pradesh Police (India): Systems encrypted
Geographic Distribution
Region/Country
Estimated Infections
Notable Impacts
Russia
~50,000
Interior Ministry, Megafon, Railway systems
United Kingdom
~20,000
NHS, Nissan manufacturing
China
~30,000
Universities, PetroChina, government systems
Spain
~15,000
Telefónica, Gas Natural, government ministries
United States
~10,000
FedEx/TNT, various enterprises
India
~10,000
Andhra Pradesh Police, various organizations
Other (144+ countries)
~65,000
Distributed across Europe, Asia, Americas, Africa
Attribution: Attackers Behind WannaCry
Attribution Context: Cybersecurity attribution is complex and rarely provides absolute certainty. Multiple intelligence agencies, private security firms, and governments contributed to the attribution analysis of WannaCry, converging on North Korea's Lazarus Group as the most likely perpetrator.
Official Government Attribution
December 18, 2017
United States, United Kingdom, Australia, Canada, New Zealand, and Japan jointly attribute WannaCry to North Korea. The U.S. Homeland Security Advisor Tom Bossert publicly stated: "We do not make this allegation lightly. It is based on evidence."
September 6, 2018
U.S. Department of Justice files criminal charges against Park Jin Hyok, alleging he was a North Korean programmer working for the Reconnaissance General Bureau (RGB), North Korea's primary intelligence agency, and was part of the conspiracy behind WannaCry.
The Lazarus Group
Background: Lazarus Group (also known as Guardians of Peace, HIDDEN COBRA, Zinc) is a North Korean state-sponsored advanced persistent threat (APT) group believed to operate under the Reconnaissance General Bureau. The group has been active since at least 2009 and is attributed to multiple high-profile cyberattacks.
Notable Lazarus Group Operations
2014 - Sony Pictures Entertainment: Destructive attack in response to the film "The Interview"
2016 - Bangladesh Bank Heist: Attempted theft of $951 million via SWIFT network (successfully stole $81 million)
2017 - WannaCry: Global ransomware attack
2018-Present - Cryptocurrency Exchanges: Multiple targeted attacks on exchanges
Attack Classification: WannaCry is a wormable ransomware cryptoworm that combines network worm propagation capabilities with file-encrypting ransomware payload.
Important: File decryption without the attacker's private key is not possible. Focus on containment, eradication, and restoration from backups.
Create memory dumps for forensic analysis
Remove malware using updated antivirus tools
Restore systems from clean backups
Rebuild systems if necessary
Verify patches before reconnecting to network
Do NOT Pay Ransom: Government agencies and security experts recommend against paying ransom. There's no guarantee of file recovery, and payment funds criminal activities.
Impact: Consequences of the WannaCry Attack
Global Statistics
Infected Systems: ~200,000 computers across 150+ countries