Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security //

Ransomware

// // //
3/29/2018
08:05 AM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now

WannaCry Ransomware Hits Boeing, but Company Claims It's Contained

On Thursday, reports surfaced that a Boeing plant sustained a cyber attack that appeared related to the WannaCry ransomware virus, but the company claimed it did not affect production.

A Boeing aircraft plant appears to have sustained a cyber attack related to the WannaCry ransomware virus, although the company downplayed the attack and later claimed that it did not affect production or spread beyond the one facility.

The attack appears to have affected the company's aircraft facility in North Charleston, S.C., according to the Seattle Times, which first reported the incident late Wednesday.

Boeing released a short statement downplaying the attack but also reassuring its customers that production would carry on. The statement did not mention WannaCry specifically.

(Source: Boeing)
(Source: Boeing)

"Our cybersecurity operations center detected a limited intrusion of malware that affected a small number of systems. Remediations were applied and this is not a production or delivery issue," according to Boeing's March 28 statement.

If the attack against Boeing is related to WannaCry, it's the first time that the ransomware has hit a major target since first coming to light in 2017. Before it was contained, WannaCry affected about 400,000 computers in 150 companies and caused about $4 billion worth of damage, according to Kasperksy Labs.

When it first emerged early last year, WannaCry appeared to be a game-changer. It acted like a traditional malware worm, but it managed to spread throughout corporate networks without relying on a user to open malicious attachments or emails. It also took advantage of enterprises not patching older versions of Microsoft Windows. (See WannaCry Was Just the Beginning.)

Although it has never been proven, many security researchers believe that North Korea was behind the original attack. (See New Insight on WannaCry's Roots.)

If the cyber attack against Boeing is Wannacry, it's the third time within two weeks that an enterprise or government agency has reported an issue with ransomware. Atlanta is still dealing with the fallout over a massive attack that happened last week, and on Thursday, a ransomware attack targeted Baltimore's 911 system.


The fundamentals of network security are being redefined -- don't get left in the dark by a DDoS attack! Join us in Austin from May 14-16 at the fifth annual Big Communications Event. There's still time to register and communications service providers get in free!

What also makes these types of cyber attacks strange is that the number of ransomware attacks since last year has been decreasing, as attackers appear to have moved on to different schemes, most notably cryptocurrency mining. (See As Ransomware Declines, Atlanta Is Odd Man Out.)

After the WannaCry attack came to light in 2017, Microsoft issued a series of patches and sent out alerts to customers to update older systems.

However, according to the Seattle Times, the Boeing facility may have been running an older version of Windows embedded within certain systems that are used to monitor or test production equipment. It's rare that companies deploy patches to these older PCs, which can run for years and years without an update.

It does appear that the production equipment itself, as well as more updated machines running new versions of Windows, were not affected, which could help explain why the WannaCry ransomware did not spread.

In an email to Security Now, Fleming Shi, senior vice president of technology at Barracuda Networks, wrote that he believes that there are two ways the attack against Boeing could have happened:

  • The affected systems were segmented in their network, and an infected host had no Internet access, but was networked internally. Under such situations, the kill switch would not trigger, which allowed WannaCry to spread as if there is no kill switch.
  • Or, Boeing was hit by a new variant of the WannaCry ransomware, which was immune to the previous kill switch. This allowed the new variant was able to spread.

"I would imagine that Boing has an ATP solution that can sandbox a suspicious file, but all it takes is one vulnerable system to allow the infection to spread if the system does not exist," Shi wrote.

Editor's note: This article was updated with comments from Barracuda Networks' Fleming Shi.

Related posts:

— Scott Ferguson, is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1172
PUBLISHED: 2023-03-17
The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that w...
CVE-2023-1469
PUBLISHED: 2023-03-17
The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pec_coupon[code]’ parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenti...
CVE-2023-1466
PUBLISHED: 2023-03-17
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as critical. This issue affects the function view_student of the file admin/?page=students/view_student. The manipulation of the argument id with the input 3' AND (SELECT 2100 FROM (SELECT(...
CVE-2023-1467
PUBLISHED: 2023-03-17
A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file Master.php?f=delete_img of the component POST Parameter Handler. The manipulation of the argument path with the input C%3A%2Ffoo.txt le...
CVE-2023-1468
PUBLISHED: 2023-03-17
A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=reports&date_from=2023-02-17&date_to=2023-03-17 of the component Report Handler. The manipula...