I try to cut through all the bafflegab in this new post on InfoWorld. If you need instructions for protecting yourself against WannaCrypt, see the nex
[See the full post at: Straight answers to your questions about WannaCrypt]
![]() |
Patch reliability is unclear. Unless you have an immediate, pressing need to install a specific patch, don't do it. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
Straight answers to your questions about WannaCrypt
Home » Forums » Newsletter and Homepage topics » Straight answers to your questions about WannaCrypt
- This topic has 20 replies, 8 voices, and was last updated 8 years ago.
Tags: MS17-010 WannaCrypt
AuthorTopicViewing 9 reply threadsAuthorReplies-
MrBrian
AskWoody_MVP -
woody
ManagerMay 15, 2017 at 12:37 pm #115435 -
Seff
AskWoody PlusMay 15, 2017 at 1:40 pm #115452I imagine they want to put as little in the public domain as possible, beyond how people should protect themselves, and in particular they don’t want the malware fraternity to know how much and what exactly the experts know about this attack given that such information can only be useful to those seeking to exploit it in any rehash of the attack.
-
anonymous
GuestMay 15, 2017 at 10:49 pm #115555@ woody
Candid Wüest, a threat researcher at Symantec, said the company was carefully monitoring emails over the weekend for any evidence of phishing causing the attack but had not found it.
He said the most likely way the malware spread was through the Windows Server Message Block SMB protocol, a system used to share files between computers. While SMB is typically used for inter-office communications, some connect to the public internet, making them vulnerable to hackers.
“If it’s exposed to the internet then just having a computer online is enough,” Wüest said. The hackers exploited the EternalBlue Microsoft vulnerability stolen from the National Security Agency and dumped online a month ago. Wüest said in that month the cyber criminals behind would have been able to scan internet networks for vulnerable servers.
Once on a computer, the SMB “worm” would have been able to spread through other computers on the network, such as NHS trusts, and to other internet-connected computers.
http://www.telegraph.co.uk/technology/2017/05/15/suspicious-emails-unlikely-cause-global-cyber-attack/ (dated Noon 15 May 2017)
-
anonymous
GuestMay 15, 2017 at 11:32 pm #115581… seems, the WannaCry hackers purposely targeted corporations/companies for better monetary/bitcoins return because their computers often store important business/customer data and some of them would have enabled their port 445 to be open to the Internet, eg to use MS Remote Desktop Service.
In comparison, Home-users do not typically open their port 445 to the Internet.
-
-
-
-
DougCuk
AskWoody LoungerMay 15, 2017 at 12:57 pm #115439Very interesting that you say that Windows XP systems were not infected.
The popular press seems to be under the impression that Windows XP systems were the most likely to have been infected. Here in the UK the news media and radio phone-in shows are all bashing the NHS (Hospitals Trusts and Health Department managers) for allowing this large scale attack by still using a significant percentage of Windows XP computers. Which if your information is correct is a complete red herring (as they say). Do you have a source for the claim that XP systems were not attacked?
-
Seff
AskWoody Plus -
woody
Manager
-
-
woody
ManagerMay 15, 2017 at 4:49 pm #115481Yep. I’ve spoken with two of the foremost researchers on the topic, and both of them say that WannaCrypt does NOT infect Windows XP machines.
WinXP machines are vulnerable to SMBv1 infection, for sure. The EternalBlue code from NSA will infect WinXP machines. But WannaCrypt specifically does NOT infect WinXP.
They aren’t sure why. But they’re very sure that it doesn’t.
-
-
NoLoki
AskWoody LoungerMay 15, 2017 at 2:14 pm #115459The NHS(UK) provided an updated statement (May 13), regarding their use of WIN/XP…
While the vast majority are running contemporary systems, we can confirm that the number of devices within the NHS that reportedly use XP has fallen to 4.7 per cent, with this figure continuing to decrease.
https://digital.nhs.uk/article/1493/UPDATED-Statement-on-reported-NHS-cyber-attack-13-May-
I am not finding too many XP systems showing up as being hit by this worm, re: security sites. Those monitoring the situation (and those with honeypots) are still seeing it as a W7 directed attack. It is difficult to get info out of China on this, but it is likely that their XP systems would be more vulnerable (as most are pirated) to the newer variants coming out today and in the future (SMB related).
The Shadow Brokers stole a lot of stuff from the NSA, so there is more to come.
Secondly, Windows 10 does use SMB, e.g if you map networking drives to another W10 device.
-
woody
ManagerMay 15, 2017 at 4:54 pm #115483Yes, in fact, by default, Win10 has SMBv1 enabled.
I still haven’t heard of a single verified report that WinXP was infected – not by WannaCrypt, nor by any of the copycat variations.
That doesn’t mean WinXP CAN’T be infected. Certainly it can, using the same base code as in WannaCrypt. WinXP users definitely need to install the patch Microsoft released. But the reports that say NHS got hit particularly hard by WannaCrypt because they’re using WinXP so much are complete fabrications. Fake news.
-
-
MrBrian
AskWoody_MVPMay 15, 2017 at 2:23 pm #115460 -
anonymous
GuestMay 15, 2017 at 10:50 pm #115560New ‘WannaCry’ variant surfaces, stopped from harming computers: Check Point
http://www.reuters.com/article/us-cyber-attack-virus-idUSKCN18B2IT (Mon May 15, 2017 | 5:34pm EDT)
-
anonymous
GuestMay 15, 2017 at 11:00 pm #115569Cyber attack: Hackers in China try to seize control of WannaCry ransomware’s ‘kill switch’
https://www.theverge.com/2017/5/15/15643226/wannacry-ransomware-north-korea-attribution-wannacrypt
-
anonymous
GuestMay 16, 2017 at 5:30 am #115619In fact, WannaCry has caused so much damage with such little profit that some security researchers have begun to suspect that it may not be a money-making scheme at all. Instead, they speculate, it might be someone trying to embarrass the NSA by wreaking havoc with its leaked hacking tools—possibly even the same Shadow Brokers hackers who stole those tools in the first place. “I absolutely believe this was sent by someone trying to cause as much destruction as possible,” says Hacker House’s Hickey.
https://www.wired.com/2017/05/wannacry-ransomware-hackers-made-real-amateur-mistakes/
-
NoLoki
AskWoody LoungerMay 16, 2017 at 6:36 am #115633Just seen this on ibtimes …
“TheShadowBrokers is launching new monthly subscription model. Is being like wine of month club. Each month peoples can be paying membership fee, then getting members only data dump each month.”
Cheeky.
-
anonymous
GuestMay 16, 2017 at 8:26 am #115668@ No Loki … From your link, this link ….
https://steemit.com/shadowbrokers/@theshadowbrokers/oh-lordy-comey-wanna-cry-edition
Sale is buy or no buy, no bad things happen if no buy. Ransom is buy or bad things happen to you. Yes?
(Sounds like a hacker in China or NKorea)
.Despite what scumbag Microsoft Lawyer is wanting the peoples to be believing Microsoft is being BFF with theequationgroup. Microsoft and theequationgroup is having very very large enterprise contracts millions or billions of USD each year. TheEquationGroup is having spies inside Microsoft and other U.S. technology companies. Unwitting HUMINT. TheEquationGroup is having former employees working in high up security jobs at U.S. Technology companies. Witting HUMINT. Russian, China, Iran, Israel intelligence all doing same at global tech companies. TheShadowBrokers is thinking Google Project Zero is having some former TheEquationGroup member. Project Zero recently releasing “Wormable Zero-Day” Microsoft patching in record time, knowing it was coming? coincidence?
-
-
GoneToPlaid
AskWoody LoungerMay 16, 2017 at 10:44 am #115719Good stuff. I’m still not clear on (1) the initial attack vector and (2) whether WannaCrypt uses and/or leaves behind a copy of DarkPulsar. Strange that so many systems could be hit, and so many security researchers could be looking at it – and we still don’t know the basics.
I too am no longer certain whether or not WannaCrypt actually installs DoublePulsar. MalwareBytes still reports that WannyCrypt installs DoublePulsar. See:
https://blog.malwarebytes.com/threat-analysis/2017/05/the-worm-that-spreads-wanacrypt0r/
Symantec has updated their documentation about how WannaCrypt operates. See:
https://www.symantec.com/security_response/writeup.jsp?docid=2017-051310-3522-99&tabid=2
Both of the above web pages are worth reading since we are likely to see variants of WannaCrypt in the future and since many people do not understand the difference between Worms (such as WannaCrypt) and computer Viruses. The era of simple computer Viruses is mostly long gone. The era of Worms, Backdoors, and exploitable operating system and program vulnerabilities is far nastier than the olden days of simple computer viruses.
Some online sources suggest that many computers were already infected with DoublePulsar. It is still unknown if this is correct since we have conflicting information from MalwareBytes and Symantec as to whether or not WannaCrypt actually installs DoublePulsar.
The following Symantec page has a couple of neat graphs which show when the malware started being seen and blocked by Symantec’s AV products, and how many potential infections were prevented by their AV software. Note that I am not making any endorsement for Symantec since VirusTotal shows that many other AV products were able to detect elements of WannaCrypt, although possibly not until after infection had occurred. The interesting stuff on Symantec’s web page is in Figures 1 through 3. See:
https://www.symantec.com/connect/blogs/what-you-need-know-about-wannacry-ransomware
From Figure 1 in the above link, it appears that the infection started on last Thursday and not on last Friday. Figure 2 is more interesting in that it shows the number of infections prevented per hour.
Spain’s CERT has twice updated their tools to prevent WannaCrypt infections. They offer two tools. One tool is a script file which creates zero length t.wnry files in several folders, and which then denies access to everyone on the computer. For the time being, this prevents the currently known variants of WannyCrypt from being able to infect a computer. The other tool is an executable which either must be run every time you reboot your computer, or which you could add to either your StartUp folder or run by adding the appropriate entry into your Windows registry. This tool creates three mutexes which also prevent the currently known variants of WannaCrypt from being able to execute. Documentation for these two tools is provided in both English and Spanish. See:
https://loreto.ccn-cert.cni.es/index.php/s/tYxMah1T7x7FhND
On the above web page, the link to download the Spain CERT’s ZIP file which contains both tools and related documentation is the Descargar link at the top right of the web page. I would have provided the link for the English version of the above web page, but that link isn’t working.
Finally and no matter what, PLEASE follow Woody’s instructions for making sure that you have installed, at the very least, the one update needed for your Windows computer which fixes the SMB1 vulnerability which is exploited by WannaCrypt and by any future malware which uses the EternalBlue exploit.
Best regards,
==GTP
-
NetDef
AskWoody_MVPMay 17, 2017 at 5:31 pm #115974Trojan.Adylkuzz
https://www.symantec.com/security_response/writeup.jsp?docid=2017-051707-0237-99
( . . . ) we discovered another very large-scale attack using both EternalBlue and DoublePulsar to install the cryptocurrency miner Adylkuzz. Initial statistics suggest that this attack may be larger in scale than WannaCry, affecting hundreds of thousands of PCs and servers worldwide: because this attack shuts down SMB networking to prevent further infections with other malware (including the WannaCry worm) via that same vulnerability, it may have in fact limited the spread of last week’s WannaCry infection.
Sigh . . .
~ Group "Weekend" ~
Viewing 9 reply threads -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Flash Drive Eject Error for Still In Use
by
J9438
17 minutes ago -
Windows 11 Insider Preview build 27863 released to Canary
by
joep517
17 hours, 36 minutes ago -
Windows 11 Insider Preview build 26120.4161 (24H2) released to BETA
by
joep517
17 hours, 38 minutes ago -
AI model turns to blackmail when engineers try to take it offline
by
Cybertooth
10 hours, 21 minutes ago -
Migrate off MS365 to Apple Products
by
dmt_3904
1 hour, 48 minutes ago -
Login screen icon
by
CWBillow
43 minutes ago -
AI coming to everything
by
Susan Bradley
17 hours, 47 minutes ago -
Mozilla : Pocket shuts down July 8, 2025, Fakespot shuts down on July 1, 2025
by
Alex5723
1 day, 9 hours ago -
No Screen TurnOff???
by
CWBillow
1 day, 9 hours ago -
Identify a dynamic range to then be used in another formula
by
BigDaddy07
1 day, 10 hours ago -
InfoStealer Malware Data Breach Exposed 184 Million Logins and Passwords
by
Alex5723
1 day, 21 hours ago -
How well does your browser block trackers?
by
n0ads
1 day, 8 hours ago -
You can’t handle me
by
Susan Bradley
8 hours, 3 minutes ago -
Chrome Can Now Change Your Weak Passwords for You
by
Alex5723
1 day ago -
Microsoft: Over 394,000 Windows PCs infected by Lumma malware, affects Chrome..
by
Alex5723
2 days, 9 hours ago -
Signal vs Microsoft’s Recall ; By Default, Signal Doesn’t Recall
by
Alex5723
1 day, 12 hours ago -
Internet Archive : This is where all of The Internet is stored
by
Alex5723
2 days, 9 hours ago -
iPhone 7 Plus and the iPhone 8 on Vantage list
by
Alex5723
2 days, 9 hours ago -
Lumma malware takedown
by
EyesOnWindows
1 day, 21 hours ago -
“kill switches” found in Chinese made power inverters
by
Alex5723
2 days, 18 hours ago -
Windows 11 – InControl vs pausing Windows updates
by
Kathy Stevens
2 days, 18 hours ago -
Meet Gemini in Chrome
by
Alex5723
2 days, 22 hours ago -
DuckDuckGo’s Duck.ai added GPT-4o mini
by
Alex5723
2 days, 22 hours ago -
Trump signs Take It Down Act
by
Alex5723
3 days, 6 hours ago -
Do you have a maintenance window?
by
Susan Bradley
1 day, 11 hours ago -
Freshly discovered bug in OpenPGP.js undermines whole point of encrypted comms
by
Nibbled To Death By Ducks
2 days, 8 hours ago -
Cox Communications and Charter Communications to merge
by
not so anon
3 days, 9 hours ago -
Help with WD usb driver on Windows 11
by
Tex265
21 hours, 3 minutes ago -
hibernate activation
by
e_belmont
3 days, 18 hours ago -
Red Hat Enterprise Linux 10 with AI assistant
by
Alex5723
3 days, 22 hours ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.