Everything You Need to Know About the WannaCry Ransomware Attack

May 15, 2017

11:20 am

Over the weekend, a cyber attack the likes of which the world has never seen held important data, pictures, and information hostage demanding Bitcoin ransom payments from worried users everywhere. While this kind of hack is alarming enough to make any tech enthusiast move to a shack in the woods, it’s important to remember that knowledge, even in these kinds of unsettling scenarios, is power.

This attack, dubbed WannaCry, was the real deal, and knowing everything you can about this cyber attack is vital to protecting yourself from one in the future. Take a look at everything we know about the WannaCry ransomware attack below:

The Biggest Ever

The WannaCry ransomware attack affected more than 230,000 computers in 150 countries. The attacks in question were sent out in 28 different languages, further cementing the unprecedented spread and growth of this hack. In addition to the many users attacked, large companies, like FedEx, Telefónica, and Deutsche Bahn, were also effected, leaving millions at risk.

Only Affected PCs

Breathe easy, Apple users. This worldwide ransomware attack was perpetrated through the Windows operating system, meaning that only PCs were affected. The attack was so overarching that it even affected notably older iterations like Windows XP and Windows Server 2003, forcing the company to release updates to address now-obvious vulnerabilities. And if you didn’t know that there were 230,000 PC users in the world, well that’s on you.

Mortal Implications

In addition to the hundreds of thousands of users affected, along with the dozens of large companies,  sixteen National Health Service organizations in the U.K. were hit, including a number of hospitals. It’s not hard to understand that a cyber attack on a hospital could not only prevent meaningful care on ailing patients, but could actively kill someone in need of help.

Who Slowed It Down?

In perhaps the most well-timed accident in the history of hacking, one user, known only by his Twitter handle “@MalwareTech,” significantly and unintentionally slowed down the attack in an effort to simply track its progress. By registering one of the web domains used by the attackers that hadn’t been registered, he triggered a crash that would hinder the ransomware from spreading at the speed it was. How do we know it was an accident? Well, he told us.

Could Just Be Getting Started

Because the attack occurred on Friday, right before people left their offices and went home for the weekend, many computers weren’t affected because they simply weren’t in use. Some experts have expressed concern that once people get back in the swing of things at work, the problem might jumpstart itself, causing more problems than before. Plus, with two new variations of the malware already detected, we might not be out of the woods just yet.

Read more about protecting yourself from cyber attacks here on Tech.Co

Did you like this article?

Get more delivered to your inbox just like it!

Sorry about that. Try these articles instead!

Conor is a writer, comedian and world-renowned sweetheart. As the Senior Writer at Tech.Co, he’s written about everything from Kickstarter campaigns and budding startups to tech titans and innovative technologies. His background in stand-up comedy made him the perfect person to host Startup Night at SXSW and the Funding Q&A at Innovate! and Celebrate, posing questions to notable tech minds from around the world. In his spare time, he thinks about how to properly pronounce the word “colloquially.”

Conor is the Senior Writer at Tech.Co. You can email him at [email protected].

  • Shares

Leave a Reply

  • (will not be published)
TechCo Spotlight 300×250
Startup_Mixology_300x250
Enqos – Tower V1