In the same way that bacteria mutate to become resistant to antibiotics, so has the WannaCry virus.
That malware was behind the massive ransomware attack that started Friday, hitting more than 150 countries and 200,000 computers, shutting down hospitals, universities, warehouses and banks.
The attack locked people out of their computers, demanding they pay up to $300 worth of bitcoin apiece or risk losing their important files forever. The attack quickly spread across the world, until a cybersecurity researcher accidentally found a kill switch in the code — an unregistered domain name that he purchased for $10.69 to halt the WannaCry hack, at least temporarily.
Hackers have since updated the ransomware, this time without the kill switch. New variations of the ransomwar have popped up without the Achilles heel and bearing the name Uiwix, according to researchers at Heimdal Security.
WannaCry harks back to an earlier era of computing insecurity, when viruses routinely swept across the internet, causing widespread disruption and spurring desperate fixes that befit their often ominous names: Mydoom, BadTrans, Sobig, Netsky. Ransomware puts a new spin on that threat, and it’s a growth industry. Security company Symantec says that ransomware attacks jumped by more than one-third to over 483,800 incidents in 2016.
Over the years, Windows PCs have been the battleground on which these attacks have played out, as hackers have exploited vulnerabilities in what for decades was the mostly widely used operating system. On Sunday, the top legal officer at Windows maker Microsoft criticized governments for stockpiling software flaws and not warning companies, calling the WannaCry attack a “wakeup call.”
The new ransomware demands 0.11943 bitcoin, or about $218. It uses all the same exploits as the WannaCry ransomware, including EternalBlue, a vulnerability first discovered by the NSA and leaked by the hacker group Shadow Brokers in April.
“These appear to be ‘patched’ versions of the original malware, rather than recompiled versions developed by the original authors,” Ryan Kalember, senior vice president of cybersecurity strategy at Proofpoint said.
He predicted that new, mutated variants of the global virus will continue to pop up at an alarming rate. In the last 14 months, Kalember said, there have been new variants of ransomware every two to three days. Alphonsus Olieh Jr. CEO of Olieh Industrial Solutions views WannaCry as a global threat that must be addressed by the UN. “Only an united global body will be able to fix this cyber issue. I fear WannaCry is only the beginning of a much larger cyber attack that could shut down the whole worldwide internet”. Mr. Olieh Jr. said.
Although Microsoft patched the vulnerability in March, the ransomware preys on older systems, like those at National Health Service hospitals in England, which heavily rely on Windows XP.
Organizations have been urged to update their systems immediately to ensure that they are not affected by the ransomware.
As the ransomware continues to spread, you can follow along on a live tracking map from Malware Tech.