No More Tears: How to Protect Against WannaCry & Other Hack Attacks

May 30, 2017
The WannaCry ransomware attack could have had a severe impact on manufacturing—and worse attacks are coming. Here are some easy-to-deploy tips to keep your plant protected.

By now, you probably know about the Wanna Cry ransomware attack that began on May 12 that affected more than 230,000 computers across the globe.

By most accounts, this cyber attack could have been a lot worse.

The ransomware, which infected FedEx, Nissan, and Britain’s NHS, bled $300 from each target willing to pay, earned only a paltry $55,000. That means it generated profits from only 183 of nearly a quarter-million possible hostages. And those who paid weren’t guaranteed to get their files decrypted due to serious missteps by the criminals.

“These attackers weren’t as advanced as you’d think,” says Marc Blackmer, Product Marketing Manager for Industry Solutions at Cisco.

This self-propagating worm—stolen from our own NSA—luckily was corralled before it could spread throughout the United States. A kill switch (purposely built into the code) was activated when a 22-year-old U.K. cybersecurity expert named Marcus Hutchins registered a specific website domain, effectively ending the infection from spreading.

“Of course, everyone is wondering now what's going to happen when someone with some real skill and real malicious intent builds upon this,” Blackmer says.

One scenario is that the Internet will explode and we’ll revert to some analog Mad Max nightmare world where life’s basic needs can’t be met via smartphone. Uber. Amazon. Tinder. All gone. (See you in the Thunderdome, Millennials.)

 Another option is that you and your company execute the following cybersecurity measures listed in our gallery, and you might just live long enough to see the robot civil war. 

About the Author

John Hitch | Editor, Fleet Maintenance

John Hitch, based out of Cleveland, Ohio, is the editor of Fleet Maintenance, a B2B magazine that addresses the service needs for all commercial vehicle makes and models (Classes 1-8), ranging from shop management strategies to the latest tools to enhance uptime.

He previously wrote about equipment and fleet operations and management for FleetOwner, and prior to that, manufacturing and advanced technology for IndustryWeek and New Equipment Digest. He is an award-winning journalist and former sonar technician aboard a nuclear-powered submarine where he served honorably aboard the fast-attack submarine USS Oklahoma City (SSN-723).

Related

6. Viral Outbreaks
Industry Trends

Shadow Brokers No Joke; But Who Are They?

Aug. 18, 2016
The group responsible for leaking NSA cyber weapons sound like crazy Russian super villains, but there's something strangely familiar about their message.
Connected Car Console Display
Technology Innovations

Connected Cars Could Be Hacker Magnets

April 14, 2016
Top U.S. Justice Department official calls for the automotive industry to ensure built-in cybersecurity protection on connected vehicles.
Clouds_HiRes1.jpg_600x0
Technology Innovations

NED Cybersecurity Report Part 4: How I Learned to Stop Worrying and Love IoT

Feb. 12, 2016
In this chapter of NED's cybersecurity coverage, we discuss how the Internet of Things could be the solution to all our problems, and also destroy us, too.
cybercriminal
Research and Development

NED Cyber Security Report Part 1: Beware the IoT (Internet of Thieves)

Feb. 9, 2016
This exclusive series examines what you should know about cyber security in 2016, from the threats to defenses. Today we introduce the greasy cybercriminal syndicate that operates...