The attackers behind WannaCry used the NSA 0-day Eternal Blue and Double Pulsar exploits first made available earlier this year by a group called the Shadow Brokers. Initially, the malware propagated via spam emails—including fake invoices, job offers, and other traps—which contained a .zip file that initiated the WannaCry infection. Eternal Blue exploits an older flaw in the Server Message Block (SMB) in Microsoft Windows, which can allow remote code execution. This flaw was patched in Microsoft’s March 2017 update cycle, but many organizations had not run the patch or were using unsupported legacy operating systems like XP. Inception: First appeared in March 2017 but spread in May 2017; Attack vector: Eternal Blue Server Message Block (SMB) Exploit Kit
Tag Cloud
AI
android
antivirus
artificial intelligence
backup
bloatware
brightcloud threat intelligence
cloud computing
cryptocurrency
cyber resilience
cyberscam
data breach
data protection
deepfake
digital identity
dns protection
endpoint security
https
identity management
identity theft
infosec
insurance
ios
mac
machine learning
malware
password
password protection
PC optimizer
personal data
phishing
podcast
privacy
ransomware
remote work
security awareness training
small business security
social media
texting scam
text scam
threat intelligence
virus
vpn
wifi security
windows






