ON MAY 12, WannaCry infected around 200,000 machines in the largest ransomware attack to date. Through a vulnerability in the Server Message Block, WannaCry sent a worm through infected systems, scrambling files, before demanding $300 in Bitcoins. It used two vulnerabilities, EternalBlue and DoublePulsar, which had been stolen from the National Security Agency. Win 7 PCs without the latest patch (issued on March 14) took 98 percent of the hits.
Once the panic died down, the end results proved mundane. Under $100,000 in Bitcoin was paid out. A nebulous group of hackers, the Lazarus Group, with probable links to North Korea, had been cited as a possible culprit, although only through similarities in the code. What did we learn? Well, as Microsoft’s president, Brad Smith, points out, the NSA needs…
