SlideShare a Scribd company logo
GLOBAL RANSOMWARE ATTACKS - WANNACRY
McGRIFF, SEIBELS & WILLIAMS, INC.
URGENT CLIENT ALERT!
TherecentglobalcyberattackusingWannaCryransomwarereminds
usthatproperinformationsecurityhygieneandappropriateback-up
management and software patching protocols are critical to attack
prevention and loss minimization. To refresh, a ransomware attack
spread throughout the world over the weekend, infecting systems
in over 150 countries. The attack used software code stolen from
the National Security Agency that was posted online.
WHAT DOES THIS ATTACK MEAN?
What is interesting about this is how different it is and the
precedent it is setting. This is the second known usage of a hacking
toolset leaked from the NSA in 2017. It is the first time it was used
to execute this type of large scale extortion en masse. The hacking
toolset was tweaked just slightly and relatively quickly. Attackers
had to strike blitzkrieg-style – all at once and against many locations
-sincetheywerefullyawarethatafixwouldberelativelysimple.So,
itisclearthatthiswasacoordinatedandplannedevent,designedto
take advantage of a hunting technique within the attack itself that is
constantly looking for additional targets. That is why it propagated
so quickly and why, eventually, it will reach every part of the globe.
As already reported, this attack is primarily affecting Russia, Eastern
Europe, UK and Taiwan, which is an incredibly interesting mix - the
outliers in this initial attack were clearly Taiwan and the UK. While
we cannot know for sure, this could have just been opportunistic, or
possibly,agameofmisdirectionintendedtoobfuscateanyattemptat
attribution. The attack itself is new and unique, but not sophisticated.
Microsoft, for the most part, released a patch for this exploit
one month ago. Bottom line: the attackers behind this operation
developed an attack based upon new techniques disclosed in the
NSA leak and they preyed upon companies and their machines that
remained unpatched. In a sense, it was very avoidable.
MORE ON THE “HUNTER MODULE”
This is an exploitive feature that scans for any vulnerable systems
within a target organization’s ecosystem. Companies that have
adhered to the best patching protocols could still be accessed
through connections with their supply chain and external vendors
who have vulnerable devices. All the attackers need is one hook
(one weak machine) and then they can swim laterally within the
networktocausemaximumdamage.Asthesayinggoes,“anetwork
is only as secure as the least secure network connected to it.”
WHAT’S NEXT?
This is just the beginning. We can assume that the attackers used
this as a pilot project and that they will adapt based on what they
learned with this effort. The NSA toolset that was leaked was vast
and there are people analyzing these tools and working on ways to
alter them slightly for their own nefarious purposes. The key will be
knowledgeofthetechniquesandpersistentpatchingandupgrading
worldwide. But, keep in mind, not all of the tools the NSA used
involved unpatched computers - far from it. This hack was built to
exploit the blind spots in traditional security.
Even though responders were able to identify and activate a kill
switch (safety valve) that was embedded by the attackers, this
is no panacea and will be bypassed soon. Hackers have adapted
based on what they learned from this past attack and we can
expect the next wave within 24 hours. Plus, you should note that
corporations do not benefit from the kill switch since it takes
advantage of a network protocol that most large corporations
do not use. In other words, private citizens are currently safer
but companies must be hyper-vigilant.
In collaboration with our external cyber security advisors,
please review the following tips carefully with your Incident
Response Team (IRT)
One Premier Plaza, Suite 500 | 5605 Glenridge Drive | Atlanta, GA 30342
(800) 476-2541 | (404) 497-7500 | www.mcgriff.com
©2017 McGriff, Seibels & Williams, Inc.
McGRIFF, SEIBELS & WILLIAMS, INC.
Timely patching is a must. Do not leave it up to a third
partyanddonotputitonadelayedschedule.Malicious
actors conducting pre-attack surveillance can very
easily determine patch state of hardware and software
as well as exposed TCP/IP protocols such as Port 445.
Back-ups will be critical to your survival – prioritize data
and systems that must be redundant for your business
needs and for compliance with legal and regulatory
duties around the protection of the data of your clients,
patients, customers and employees.
Ensure that legacy preventative controls such as
anti-virus and firewalls are deployed and properly
configured.
Audit and reduce privileged account holders to only
those necessary.
Sunset (retire) outdated equipment and software – if
you do not maintain it, get rid of it. And, if the vendor
no longer supports it, upgrade to a higher version
immediately.
Take out of use equipment offline – disconnect and/or
shutdown machines that are no longer in use.
Conduct targeted susceptibility training with your
employees (i.e. spear phishing tests) and incorporate
awareness methodologies into the training
curriculum so that employees are kept updated on
current and emerging threats.
Manage your supply chain, hold them to the highest
informationsecuritystandardsandauditthemregularly.
Be diligent in your threat awareness and continually
update your Incident Response Team.
1 6
7
8
9
2
3
4
5
KNOW YOUR INSURANCE POLICY
• Check your K&R policy for possible coverage; note deductibles (maybe none?) and policy limits available for ransomware events
(sub-limits?); review and advise internal resources what the event notice obligations are and whether you will have access to
cyber security specialists provided by your insurer;
• Check your cyber policy for reporting obligations, policy limit and retention; verify whether you must have insurer consent prior
to engaging any cyber security resources; discuss with your internal resources whether you want to use insurer pre-approved
vendors or if you would retain your own specialists; seek and obtain insurer consent to use your own vendors prior to any event;
make certain your IRT fully understands insurance policy requirements and seeks Risk Management advice immediately upon
detection of any suspected or actual cyber incident.
• Many cyber policies contain exclusions or coverage limitations for losses arising out of the “failure to maintain minimum security
standards” or “failure to patch or remediate software errors or vulnerabilities”. Talk to your broker and check your policy
wording; ideally, it’s best to not have these exclusions or to secure a carve-back for otherwise covered loss (i.e. limit exclusion to
the costs to patch or remediate).
THE THREAT CONTINUES
According to our threat monitoring experts, current sensors are showing more than 1.5 million machines worldwide that are still
vulnerable to this attack (unless they have been patched properly in the last 24-48 hours). Beware that once the hackers relaunch
and remove the kill switch, all 1.5 million (or the remaining machines that have not been patched) could, in theory, become infected.

More Related Content

PDF
Global Ransomware Attacks
PDF
Addressing the cyber kill chain
PDF
Cylance Protect-Next-Generation Antivirus-Overview
PPTX
Intelligence-based computer network defence: Understanding the cyber kill cha...
PPTX
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
PPTX
Exploring the Capabilities and Economics of Cybercrime
PPT
Top Tactics For Endpoint Security
PDF
Understanding Cyber Attack - Cyber Kill Chain.pdf
Global Ransomware Attacks
Addressing the cyber kill chain
Cylance Protect-Next-Generation Antivirus-Overview
Intelligence-based computer network defence: Understanding the cyber kill cha...
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
Exploring the Capabilities and Economics of Cybercrime
Top Tactics For Endpoint Security
Understanding Cyber Attack - Cyber Kill Chain.pdf

What's hot (20)

PPTX
Cyber Security protection by MultiPoint Ltd.
PDF
OFFENSIVE IDS
PDF
Cyber Kill Chain Deck for General Audience
PPT
Damballa automated breach defense june 2014
PDF
Bridging the Gap Between Threat Intelligence and Risk Management
PPTX
Anatomy of a Ransomware Event
PPTX
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
PDF
Upgrading Your Firewall? Its Time for an Inline Security Fabric
PPTX
The Best Just Got Better, Intercept X Now With EDR
PPTX
Cyber kill chain
PDF
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
PDF
Defense In Depth Using NIST 800-30
PDF
Cylance_Protect_Datasheet
PPTX
The Internal Signs of Compromise
PDF
Meet Me in the Middle: Threat Indications and Warning in Principle and Practice
PPTX
kill-chain-presentation-v3
PDF
Making Threat Modeling Useful To Software Development
PDF
Corporate threat vector and landscape
PDF
Cyber Security - IDS/IPS is not enough
Cyber Security protection by MultiPoint Ltd.
OFFENSIVE IDS
Cyber Kill Chain Deck for General Audience
Damballa automated breach defense june 2014
Bridging the Gap Between Threat Intelligence and Risk Management
Anatomy of a Ransomware Event
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Upgrading Your Firewall? Its Time for an Inline Security Fabric
The Best Just Got Better, Intercept X Now With EDR
Cyber kill chain
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
Defense In Depth Using NIST 800-30
Cylance_Protect_Datasheet
The Internal Signs of Compromise
Meet Me in the Middle: Threat Indications and Warning in Principle and Practice
kill-chain-presentation-v3
Making Threat Modeling Useful To Software Development
Corporate threat vector and landscape
Cyber Security - IDS/IPS is not enough
Ad

Similar to Global ransomware attacks_2017_final msw_g2_sg (20)

PDF
Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
PDF
Information Securityfind an article online discussing defense-in-d.pdf
PPTX
M1_Introduction_IPS.pptx
PPTX
Zscaler Smokescreen Smoke Screen Foundation
PDF
Cybersecurity: Take Back Control
 
PPTX
Cyber Threat Intelligence.pptx
PPTX
Cyber security and AI
PDF
Industry_Brief_TrapX_Banking_Finance
PDF
Cybersecurity After WannaCry: How to Resist Future Attacks
PPTX
Network Security of Data Protection
PPT
Ethical hacking a licence to hack
PDF
What's behind a cyber attack
PDF
Cyber security do your part be the resistance
DOCX
Project Quality-SIPOCSelect a process of your choice and creat.docx
PDF
Advanced Endpoint Protection
PDF
Firewall buyers-guide
PPTX
How to Build and Validate Ransomware Attack Detections (Secure360)
PDF
Industry_Brief_TrapX_Medical_Devices
PPTX
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
Cylance Ransomware-Remediation & Prevention Consulting Data-sheet
Information Securityfind an article online discussing defense-in-d.pdf
M1_Introduction_IPS.pptx
Zscaler Smokescreen Smoke Screen Foundation
Cybersecurity: Take Back Control
 
Cyber Threat Intelligence.pptx
Cyber security and AI
Industry_Brief_TrapX_Banking_Finance
Cybersecurity After WannaCry: How to Resist Future Attacks
Network Security of Data Protection
Ethical hacking a licence to hack
What's behind a cyber attack
Cyber security do your part be the resistance
Project Quality-SIPOCSelect a process of your choice and creat.docx
Advanced Endpoint Protection
Firewall buyers-guide
How to Build and Validate Ransomware Attack Detections (Secure360)
Industry_Brief_TrapX_Medical_Devices
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
Ad

Recently uploaded (20)

PDF
Nidhal Samdaie CV - International Business Consultant
PPTX
Amazon (Business Studies) management studies
PPT
340036916-American-Literature-Literary-Period-Overview.ppt
PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
PPTX
Lecture (1)-Introduction.pptx business communication
PDF
MSPs in 10 Words - Created by US MSP Network
PPTX
5 Stages of group development guide.pptx
PDF
Business model innovation report 2022.pdf
PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
DOCX
Business Management - unit 1 and 2
PDF
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
PDF
A Brief Introduction About Julia Allison
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PDF
Unit 1 Cost Accounting - Cost sheet
PPTX
New Microsoft PowerPoint Presentation - Copy.pptx
PPTX
HR Introduction Slide (1).pptx on hr intro
PDF
WRN_Investor_Presentation_August 2025.pdf
PDF
DOC-20250806-WA0002._20250806_112011_0000.pdf
PDF
Laughter Yoga Basic Learning Workshop Manual
PDF
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
Nidhal Samdaie CV - International Business Consultant
Amazon (Business Studies) management studies
340036916-American-Literature-Literary-Period-Overview.ppt
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
Lecture (1)-Introduction.pptx business communication
MSPs in 10 Words - Created by US MSP Network
5 Stages of group development guide.pptx
Business model innovation report 2022.pdf
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
Business Management - unit 1 and 2
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
A Brief Introduction About Julia Allison
Belch_12e_PPT_Ch18_Accessible_university.pptx
Unit 1 Cost Accounting - Cost sheet
New Microsoft PowerPoint Presentation - Copy.pptx
HR Introduction Slide (1).pptx on hr intro
WRN_Investor_Presentation_August 2025.pdf
DOC-20250806-WA0002._20250806_112011_0000.pdf
Laughter Yoga Basic Learning Workshop Manual
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider

Global ransomware attacks_2017_final msw_g2_sg

  • 1. GLOBAL RANSOMWARE ATTACKS - WANNACRY McGRIFF, SEIBELS & WILLIAMS, INC. URGENT CLIENT ALERT! TherecentglobalcyberattackusingWannaCryransomwarereminds usthatproperinformationsecurityhygieneandappropriateback-up management and software patching protocols are critical to attack prevention and loss minimization. To refresh, a ransomware attack spread throughout the world over the weekend, infecting systems in over 150 countries. The attack used software code stolen from the National Security Agency that was posted online. WHAT DOES THIS ATTACK MEAN? What is interesting about this is how different it is and the precedent it is setting. This is the second known usage of a hacking toolset leaked from the NSA in 2017. It is the first time it was used to execute this type of large scale extortion en masse. The hacking toolset was tweaked just slightly and relatively quickly. Attackers had to strike blitzkrieg-style – all at once and against many locations -sincetheywerefullyawarethatafixwouldberelativelysimple.So, itisclearthatthiswasacoordinatedandplannedevent,designedto take advantage of a hunting technique within the attack itself that is constantly looking for additional targets. That is why it propagated so quickly and why, eventually, it will reach every part of the globe. As already reported, this attack is primarily affecting Russia, Eastern Europe, UK and Taiwan, which is an incredibly interesting mix - the outliers in this initial attack were clearly Taiwan and the UK. While we cannot know for sure, this could have just been opportunistic, or possibly,agameofmisdirectionintendedtoobfuscateanyattemptat attribution. The attack itself is new and unique, but not sophisticated. Microsoft, for the most part, released a patch for this exploit one month ago. Bottom line: the attackers behind this operation developed an attack based upon new techniques disclosed in the NSA leak and they preyed upon companies and their machines that remained unpatched. In a sense, it was very avoidable. MORE ON THE “HUNTER MODULE” This is an exploitive feature that scans for any vulnerable systems within a target organization’s ecosystem. Companies that have adhered to the best patching protocols could still be accessed through connections with their supply chain and external vendors who have vulnerable devices. All the attackers need is one hook (one weak machine) and then they can swim laterally within the networktocausemaximumdamage.Asthesayinggoes,“anetwork is only as secure as the least secure network connected to it.” WHAT’S NEXT? This is just the beginning. We can assume that the attackers used this as a pilot project and that they will adapt based on what they learned with this effort. The NSA toolset that was leaked was vast and there are people analyzing these tools and working on ways to alter them slightly for their own nefarious purposes. The key will be knowledgeofthetechniquesandpersistentpatchingandupgrading worldwide. But, keep in mind, not all of the tools the NSA used involved unpatched computers - far from it. This hack was built to exploit the blind spots in traditional security. Even though responders were able to identify and activate a kill switch (safety valve) that was embedded by the attackers, this is no panacea and will be bypassed soon. Hackers have adapted based on what they learned from this past attack and we can expect the next wave within 24 hours. Plus, you should note that corporations do not benefit from the kill switch since it takes advantage of a network protocol that most large corporations do not use. In other words, private citizens are currently safer but companies must be hyper-vigilant.
  • 2. In collaboration with our external cyber security advisors, please review the following tips carefully with your Incident Response Team (IRT) One Premier Plaza, Suite 500 | 5605 Glenridge Drive | Atlanta, GA 30342 (800) 476-2541 | (404) 497-7500 | www.mcgriff.com ©2017 McGriff, Seibels & Williams, Inc. McGRIFF, SEIBELS & WILLIAMS, INC. Timely patching is a must. Do not leave it up to a third partyanddonotputitonadelayedschedule.Malicious actors conducting pre-attack surveillance can very easily determine patch state of hardware and software as well as exposed TCP/IP protocols such as Port 445. Back-ups will be critical to your survival – prioritize data and systems that must be redundant for your business needs and for compliance with legal and regulatory duties around the protection of the data of your clients, patients, customers and employees. Ensure that legacy preventative controls such as anti-virus and firewalls are deployed and properly configured. Audit and reduce privileged account holders to only those necessary. Sunset (retire) outdated equipment and software – if you do not maintain it, get rid of it. And, if the vendor no longer supports it, upgrade to a higher version immediately. Take out of use equipment offline – disconnect and/or shutdown machines that are no longer in use. Conduct targeted susceptibility training with your employees (i.e. spear phishing tests) and incorporate awareness methodologies into the training curriculum so that employees are kept updated on current and emerging threats. Manage your supply chain, hold them to the highest informationsecuritystandardsandauditthemregularly. Be diligent in your threat awareness and continually update your Incident Response Team. 1 6 7 8 9 2 3 4 5 KNOW YOUR INSURANCE POLICY • Check your K&R policy for possible coverage; note deductibles (maybe none?) and policy limits available for ransomware events (sub-limits?); review and advise internal resources what the event notice obligations are and whether you will have access to cyber security specialists provided by your insurer; • Check your cyber policy for reporting obligations, policy limit and retention; verify whether you must have insurer consent prior to engaging any cyber security resources; discuss with your internal resources whether you want to use insurer pre-approved vendors or if you would retain your own specialists; seek and obtain insurer consent to use your own vendors prior to any event; make certain your IRT fully understands insurance policy requirements and seeks Risk Management advice immediately upon detection of any suspected or actual cyber incident. • Many cyber policies contain exclusions or coverage limitations for losses arising out of the “failure to maintain minimum security standards” or “failure to patch or remediate software errors or vulnerabilities”. Talk to your broker and check your policy wording; ideally, it’s best to not have these exclusions or to secure a carve-back for otherwise covered loss (i.e. limit exclusion to the costs to patch or remediate). THE THREAT CONTINUES According to our threat monitoring experts, current sensors are showing more than 1.5 million machines worldwide that are still vulnerable to this attack (unless they have been patched properly in the last 24-48 hours). Beware that once the hackers relaunch and remove the kill switch, all 1.5 million (or the remaining machines that have not been patched) could, in theory, become infected.