Kill Switch found for WanaCry

ElectricSheep

Level 14
Thread author
Verified
Top Poster
Well-known
Aug 31, 2014
655
WanaCry has apparently been stopped by a Security Reasearcher known as MalwareTech who noticed an unregistered domain which he then registered, thus 'stopping it in it's tracks'.

Finding the kill switch to stop the spread of ransomware - NCSC Site

All this code is doing is attempting to connect to the domain we registered and if the connection is not successful it ransoms the system, if it is successful the malware exits. The reason was suggested to be a kill switch in case something goes wrong, but I now believe it to be anti-analysis.

In certain sandbox environments traffic is intercepted by replying to all URL lookups with an IP address belonging to the sandbox, rather than the real IP address the URL points to; a side effect of this is if an unregistered domain is queried it will respond as if it were registered.

I believe they were trying to query an unregistered domain which would appear registered in certain sandbox environments, then once they are aware they're in a sandbox the malware can exit to prevent analysis. This technique isn't unprecedented and is actually used by the Necurs trojan (they will query 5 totally random domains and if they all return the same IP, it will exit); however, because they used a hardcoded domain, registering it caused all infections globally to believe they were inside a sandbox and exit...thus we initially unintentionally prevented the spread and further ransoming of computers infected with this malware.

One thing that is very important to note is our sinkholing only stops this sample and there is nothing stopping them removing the domain check and trying again, so it's incredibly important that any unpatched systems are patched as quickly as possible. You can now even get a patch for XP.
 
Last edited:

Solarquest

Moderator
Verified
Staff Member
Malware Hunter
Well-known
Jul 22, 2014
2,525
I just found two interesting information:
From WannaCrypt ransomware worm targets out-of-date systems

"The exploit code used by WannaCrypt was designed to work only against unpatched Windows 7 and Windows Server 2008 (or earlier OS) systems, so Windows 10 PCs are not affected by this attack.

We haven’t found evidence of the exact initial entry vector used by this threat, but there are two scenarios we believe are highly possible for this ransomware family:

  • Arrival through social engineering emails designed to trick users to run the malware and activate the worm-spreading functionality with the SMB exploit
  • Infection through SMB exploit when an unpatched computer can be addressed in other infected machines"

From It’s Not Over, WannaCry 2.0 Ransomware Just Arrived With No 'Kill-Switch'

"The worm can be modified to spread other payloads not just WCry and we may see other malware campaigns piggybacking off this samples success." Hickey* says. "
*security expert and co-founder of Hacker House

It's really time to patch, NOW!..For your system and all others that can be infected because of you.
 

DarkJoney

Level 2
Verified
Aug 6, 2014
82
I want to see decryptor released by Kaspersky or Emsisoft... I am afraid that they will cut killswitch functionality at the newer modifications. Of cource, if they release them...
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top