{"id":73233,"date":"2022-12-27T06:03:09","date_gmt":"2022-12-26T22:03:09","guid":{"rendered":"https:\/\/x-phy.com\/?p=73233"},"modified":"2025-11-25T10:23:09","modified_gmt":"2025-11-25T10:23:09","slug":"wannacry-ransomware","status":"publish","type":"post","link":"https:\/\/x-phy.com\/wannacry-ransomware\/","title":{"rendered":"What is WannaCry Ransomware and How to Protect Your Data"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"73233\" class=\"elementor elementor-73233\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6e95ec89 e-flex e-con-boxed e-con e-parent\" data-id=\"6e95ec89\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5e4c7533 elementor-widget elementor-widget-text-editor\" data-id=\"5e4c7533\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>What is WannaCry Ransomware?<\/h3><p>WannaCry Ransomware is a type of malware\/computer worm that targets the windows operating system. It is also known as WannaCrypt0r, WannaCrypt, WCRY and WRypt. WannaCry has two malicious components combined which is ransomware variant and worm. It works together during the attack stage. In 2017, it attacked a huge number of computers from more than 150 countries and companies including FedEx, Telefonica were targeted. In Singapore, Tiong Bahru Plaza and White Sands are believed to be targeted by the WannaCry ransomware attack. The 2017 incident is one of the most high profile ransomware attacks that ever took place. Across the globe, the estimated cost of the cybercrime caused by the WannaCry ransomware is calculated as $4 billion USD. It mainly targets the older version of windows operating system. The employees working in the office are the main targets which is around 43% of the victims.<br \/><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/encrypted.png\" sizes=\"(max-width: 512px) 100vw, 512px\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/encrypted.png 512w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/encrypted-300x214.png 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/encrypted-450x321.png 450w\" alt=\"\" width=\"512\" height=\"365\" \/><br \/>Sample screenshot of the WannaCry attack ransom payment procedure<br \/><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Blog-Post-wannaCry-infographic.jpg\" sizes=\"(max-width: 977px) 100vw, 977px\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Blog-Post-wannaCry-infographic.jpg 977w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Blog-Post-wannaCry-infographic-244x300.jpg 244w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Blog-Post-wannaCry-infographic-834x1024.jpg 834w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Blog-Post-wannaCry-infographic-768x943.jpg 768w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Blog-Post-wannaCry-infographic-450x553.jpg 450w\" alt=\"\" width=\"977\" height=\"1200\" \/><br \/>Attack flow<br \/>Source: <a style=\"color: #df166a;\" href=\"https:\/\/dig.watch\/trends\/wannacry\" target=\"_blank\" rel=\"noopener\">https:\/\/dig.watch\/trends\/wannacry<\/a><br \/>Additional Reference<br \/><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Blog-Post-WannaCry-infographic-steps.jpg\" sizes=\"(max-width: 977px) 100vw, 977px\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Blog-Post-WannaCry-infographic-steps.jpg 977w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Blog-Post-WannaCry-infographic-steps-244x300.jpg 244w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Blog-Post-WannaCry-infographic-steps-834x1024.jpg 834w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Blog-Post-WannaCry-infographic-steps-768x943.jpg 768w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Blog-Post-WannaCry-infographic-steps-450x553.jpg 450w\" alt=\"\" width=\"977\" height=\"1200\" \/><br \/>Source: <a style=\"color: #df166a;\" href=\"https:\/\/www.europol.europa.eu\/wannacry-ransomware\" target=\"_blank\" rel=\"noopener\">https:\/\/www.europol.europa.eu\/wannacry-ransomware<\/a><\/p><h3>X-PHY protection against Wanna Cry<\/h3><p>Flexxon tested the WannaCry ransomware on a X-PHY\u00ae SSD and a normal SSD to see the responses. In less than 5 seconds, X-PHY\u00ae stopped the attack dead in its tracks, locked all data keeping it untouched, and immediately notified the user via email.<\/p><p>Here are the screenshots of the results,<\/p><h5 style=\"color: #df166a;\"><b>Testing without X-PHY, <\/b><\/h5><p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/testing-without-xphy.png\" sizes=\"(max-width: 512px) 100vw, 512px\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/testing-without-xphy.png 512w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/testing-without-xphy-300x187.png 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/testing-without-xphy-450x280.png 450w\" alt=\"\" width=\"512\" height=\"319\" \/><br \/>As the first step, the ransomware was tested on the normal SSD and the laptop security only relies on the antivirus software. The antivirus shows that the computer is safe and it doesn\u2019t detect the ransomware. It can only detect the known ransomware as it relies on the signature based detection and it won\u2019t be able to detect the unknown ransomwares.<br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/wannaCryversion.png\" sizes=\"(max-width: 512px) 100vw, 512px\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/wannaCryversion.png 512w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/wannaCryversion-300x169.png 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/wannaCryversion-450x253.png 450w\" alt=\"\" width=\"512\" height=\"288\" \/><br \/>The WannaCry.py is the modified version of the ransomware and it wasn\u2019t detected by the antivirus software. This folder contains a few GB of data for the testing purpose and it will be attacked by the WannaCry ransomware.<br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/randsomware-active.png\" sizes=\"(max-width: 512px) 100vw, 512px\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/randsomware-active.png 512w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/randsomware-active-300x169.png 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/randsomware-active-450x253.png 450w\" alt=\"\" width=\"512\" height=\"288\" \/><br \/>Currently, the ransomware is activated and it starts to encrypt the files in the test folder.<br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/wannaCry-encrypted-folder.png\" sizes=\"(max-width: 512px) 100vw, 512px\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/wannaCry-encrypted-folder.png 512w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/wannaCry-encrypted-folder-300x169.png 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/wannaCry-encrypted-folder-450x253.png 450w\" alt=\"\" width=\"512\" height=\"288\" \/><br \/>The WannaCry ransomware encrypted all the files in the test folder. The encrypted files are ending with .crypt. In real life scenarios, it can only be recovered if the victim pays the ransom to the hacker to get the decryption key.<\/p><h5 style=\"color: #df166a;\"><b>Testing with X-PHY <\/b><\/h5><p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/x-phy-installed.png\" sizes=\"(max-width: 512px) 100vw, 512px\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/x-phy-installed.png 512w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/x-phy-installed-300x204.png 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/x-phy-installed-450x306.png 450w\" alt=\"\" width=\"512\" height=\"348\" \/><br \/>Before running the ransomware with the X-PHY SSD inside the laptop, please check the configuration settings in the X-PHY tool and make sure that the security features are turned on to protect against the ransomware attack. If it\u2019s not enabled, you need to click apply and verify again with the password that you used to log in the X-PHY tool along with the 2FA.<br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/wannaCryActiveWithX-phy-Active.png\" sizes=\"(max-width: 512px) 100vw, 512px\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/wannaCryActiveWithX-phy-Active.png 512w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/wannaCryActiveWithX-phy-Active-300x169.png 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/wannaCryActiveWithX-phy-Active-450x253.png 450w\" alt=\"\" width=\"512\" height=\"288\" \/><br \/>After enabling the security features, the WannaCry ransomware activated in the test folder.<br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/x-phy-detect-randsomware.png\" sizes=\"(max-width: 512px) 100vw, 512px\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/x-phy-detect-randsomware.png 512w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/x-phy-detect-randsomware-300x156.png 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/x-phy-detect-randsomware-450x235.png 450w\" alt=\"\" width=\"512\" height=\"267\" \/><br \/>Within a few seconds, the X-PHY is able to detect the ransomware by recognising the ransomware behavior in the read and write pattern at firmware level. The X-PHY SSD locks and the laptop shutdowns immediately.<br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/emailAlertFromX-PHY.png\" sizes=\"(max-width: 512px) 100vw, 512px\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/emailAlertFromX-PHY.png 512w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/emailAlertFromX-PHY-300x144.png 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/emailAlertFromX-PHY-450x215.png 450w\" alt=\"\" width=\"512\" height=\"245\" \/><br \/>At the same time, you will be receiving the email alert regarding the ransomware attack.<br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/SSD-locked.jpg\" sizes=\"(max-width: 512px) 100vw, 512px\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/SSD-locked.jpg 512w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/SSD-locked-300x225.jpg 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/SSD-locked-450x338.jpg 450w\" alt=\"\" width=\"512\" height=\"384\" \/><br \/>When you restart the laptop after the ransomware attack, it goes into the boot menu as the X-PHY SSD is locked to secure the data inside. To unlock it, the user needs to open the X-PHY mobile application and connect to the X-PHY SSD via bluetooth.<\/p><p>Once you unlock it, the data inside the test folder is secured and protected because of the X-PHY protection. The files inside the folder aren\u2019t encrypted and it can be accessed as per normal.<br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/X-Phy-Flow.jpg\" sizes=\"(max-width: 512px) 100vw, 512px\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/X-Phy-Flow.jpg 512w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/X-Phy-Flow-300x159.jpg 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/X-Phy-Flow-450x239.jpg 450w\" alt=\"\" width=\"512\" height=\"272\" \/><\/p><h3>X-PHY<sup>\u00ae<\/sup> Response Flow<\/h3><ul><li>X-FILE FORENSIC AGENT features ACTIVE DETECTIVE and DEEP INVESTIGATION introduce extra file protection features by preventing any illegal data modifications. They also record all activities and their application, making it easy for X-PHY\u00ae to identify suspicious actors.<\/li><li>X-GUARD THREAT LOCK features SECURITY SCOUT and GUARDIAN PRO-X work together to stop any attempt by the ransomware to breach or clone your sensitive data.<\/li><li>After noticing suspicious activity to breach and\/or to encrypt user data, it will trigger X-FACTOR ENCRYPTION LOCK. KEYCODE 2-FACTOR feature within X-FACTOR ENCRYPTION LOCK locks down all the data in X-PHY\u00ae making it inaccessible to the ransomware.<\/li><li>X-PHY\u00ae SSD sends notification to the user in their computer showing that ransomware has been detected. An email notification is also sent to the user simultaneously through the user\u2019s registered email. The user will require OTP to unlock the SSD.<\/li><li>X-PHY\u00ae records the attack activity in the event log, and will automatically stop any action with the same behavior in the future.<\/li><\/ul><p>Related:<\/p><h6><a href=\"https:\/\/x-phy.com\/how-does-x-phy-ssd-help-protect-against-raas\/\">How does X-PHY<sup>\u00ae<\/sup> SSD help protect against RaaS<\/a><\/h6><h6><a href=\"https:\/\/x-phy.com\/hellokitty-ransomware-protection\/\">HelloKitty Ransomware Prevention with X-PHY SSD<\/a><\/h6><h3>Reference Links<\/h3><p>\u00a0<\/p><ul><li><a style=\"color: #df166a;\" href=\"https:\/\/www.sdxcentral.com\/security\/definitions\/case-study-wannacry-ransomware\/#:~:text=The%20WannaCry%20ransomware%20attack%20of,which%20is%20still%20felt%20today\" target=\"_blank\" rel=\"noopener\">https:\/\/www.sdxcentral.com\/security\/definitions\/case-study-wannacry-ransomware\/#:~:text=The%20WannaCry%20ransomware%20attack%20of,which%20is%20still%20felt%20today<\/a><\/li><li><a style=\"color: #df166a;\" href=\"https:\/\/www.straitstimes.com\/singapore\/global-ransomware-attack-hits-digital-directory-at-tiong-bahru-plaza\" target=\"_blank\" rel=\"noopener\">https:\/\/www.straitstimes.com\/singapore\/global-ransomware-attack-hits-digital-directory-at-tiong-bahru-plaza<\/a><\/li><li><a style=\"color: #df166a;\" href=\"https:\/\/www.acronis.com\/en-sg\/articles\/nhs-cyber-attack\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.acronis.com\/en-sg\/articles\/nhs-cyber-attack\/ <\/a><\/li><li><a style=\"color: #df166a;\" href=\"https:\/\/dig.watch\/trends\/wannacry \" target=\"_blank\" rel=\"noopener\">https:\/\/dig.watch\/trends\/wannacry<\/a><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>What is WannaCry Ransomware? WannaCry Ransomware is a type of malware\/computer worm that targets the windows operating system. It is also known as WannaCrypt0r, WannaCrypt, WCRY and WRypt. WannaCry has [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":73262,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[12],"tags":[],"class_list":["post-73233","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-use-cases"],"_links":{"self":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/73233","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/comments?post=73233"}],"version-history":[{"count":1,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/73233\/revisions"}],"predecessor-version":[{"id":110174,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/73233\/revisions\/110174"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/media\/73262"}],"wp:attachment":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/media?parent=73233"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/categories?post=73233"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/tags?post=73233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}