Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:00 AM
Ed Koehler
Ed Koehler
Connect Directly
E-Mail vvv

WannaCry Has IoT in Its Crosshairs

The wide variety of devices attached to the Internet of Things offers a rich target for purveyors of ransomware.

Ransomware attacks are on the rise. SonicWall reported a 109% increase in ransomware the US during the first half of 2020. Due to relatively low execution costs, high rates of return, and minimal risk of discovery compared with other forms of malware, ransomware has quickly become a preferred method of attack for cybercriminals.

Although computer systems remain the most common source of ransomware infection, Internet of Things (IoT) devices are also prime targets for several reasons, including the fact that hackers know enterprises often have less visibility into these devices, and can therefore inflict devastating effects without detection. In addition, IoT devices are often not built with security in mind, leaving them vulnerable for exploits. IoT-based attacks can also spread across the network very quickly to maximize damage, and ransomware can render the physical functions of that device inaccessible until the ransom is paid. 

Related Content:

What's on Your Enterprise Network? You Might Be Surprised

Special Report: Computing's New Normal, a Dark Reading Perspective

New on The Edge: Don't Fall for It! Defending Against Deepfakes

Unfortunately, there's a lot of finger-pointing when it comes to who is responsible for bolstering IoT security. Often, it's up to individual organizations to protect themselves from IoT-based attacks.

Of all the types of ransomware, one of the most damaging and infamous is WannaCry. It is estimated to have affected more than 200,000 computers across 150 countries, with total damages ranging from hundreds of millions to billions of dollars. WannaCry, as well as other forms of malware and ransomware, leverage a well-known exploit named EternalBlue. It exploits a vulnerability in the Window's Server Message Block version 1 (SMB v1) protocol, which allows the malware to spread to all unpatched Windows systems from XP to 2016 on any network that has this protocol enabled. 

Although WannaCry was first detected in May 2017, according to Safety Detectives, it still represents nearly half of all reported ransomware incidents in the US today. All EternalBlue-based malware (including WannaCry) exploits the same Windows vulnerability. Since these attacks are still increasing three years later, it's evident that there are plenty of unpatched Windows systems still out there.

And again, while WannaCry primarily targets computers, IoT devices were not — and are not — immune.

How One Hospital Stopped a WannaCry Attack
In 2019, a European hospital system discovered their ultrasound devices were infected with WannaCry. Several digital imaging and communications in medicine (DICOM) devices were also affected because they were running old versions of MS Windows operating systems. These devices couldn't be patched without breaking the device manufacturer's warranty and, due to the expense of these devices, couldn't easily be replaced. 

Fortunately, the hospital acted fast and was able to stop this attack. Specifically, they:

  • Confirmed the existence of the infection on the imaging machines.
    The hospital selected one of the suspicious DICOM devices, an ultrasound in the maternity section of the hospital. This was a particularly dangerous case because some of the images and reports could be stolen and held for ransom, or worse, the device could be taken control of and rendered unusable. They performed a traffic capture on the ultrasound device and found a significant number of flows from the ultrasound to the network, using SMB Over TCP (port 445). Since this was the preferred port and known exploit for EternalBlue/WannaCry, it confirmed that the machine was infected.
  • Applied security profiles and isolated the affected devices.
    Since the ultrasound device couldn't be patched or upgraded, they couldn't eliminate the infection. However, the hospital was able to contain it and continue using infected medical devices without worrying about infecting the broader network or losing the ultrasound images and files. In order to do this, the hospital used a security solution that could segment and isolate certain devices on the network, so that the infection could be contained within the ultrasound device, preventing propagation through the network. The IT team then applied policies to the ultrasound device to ensure that no UDP/TCP ports were opened, except those explicitly allowed by the imaging staff and IT managers. 
  • Monitored unattended devices and remained vigilant. 
    The action didn't stop when the hospital isolated the known impacted devices. Hospitals and other organizations that have had their computer systems impacted by multiple rounds of WannaCry outbreaks need to confirm that any medical devices (especially those running old versions of MS Windows Operating Systems) haven't also been infected. The European hospital verified other devices weren't affected, and continued to closely monitor for any suspicious activity.

The Road Ahead
Cybersecurity experts all agree that ransomware attacks are only going to accelerate and could represent an increased threat to IoT devices in 2020 and beyond. In addition to protecting your computer systems and company data from the threat of a ransomware attack, it is critical to review and update your current IoT security practices, especially for mission critical endpoints such as medical devices and industrial control systems.

Ransomware isn't going anywhere, but we can make sure we're prepared for the next time it strikes.

Ed Koehler has been in the communications and networking industry for 20+ years. Ten of those years he spent as a Senior Technology Architect for R&D within the CTO division of Nortel. His area specialties are, IPv6, Multicast, Digital Identity and Network Security as well as ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
The Yellow Brick Road to Risk Management
Andrew Lowe, Senior Information Security Consultant, TalaTek,  11/19/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: He hits the gong anytime he sees someone click on an email link.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-25
Affected versions of Atlassian Fisheye/Crucible allow remote attackers to achieve Regex Denial of Service via user-supplied regex in EyeQL. The affected versions are before version 4.8.4.
PUBLISHED: 2020-11-25
scan.c in x11vnc 0.9.16 uses IPC_CREAT|0777 in shmget calls, which allows access by actors other than the current user.
PUBLISHED: 2020-11-25
Affected versions of Atlassian Fisheye/Crucible allow remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability in the MessageBundleResource within Atlassian Gadgets. The affected versions are before version 4.8.4.
PUBLISHED: 2020-11-25
osCommerce has XSS vulnerability via the authenticated user entering the XSS payload into the title section of newsletters.
PUBLISHED: 2020-11-25
GLPI stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.3, any authenticated user has read-only permissions to the planning of ever...