0161 941 5330

WannaCry? The NHS certainly did.


On the 12/05/2017 one of the biggest cyber-attacks quickly spread over the world, causing a crisis in National Health Service hospitals and some of Europe’s biggest businesses. The new strain of ransomware WannaCry (also known as WanaCrypt0r and Wcry) is a malware that usually locks users out of their own system (usually by encrypting the data on the hard drive) and then holding the decryption, or another release key, ransom until the victim pays the fee. The fee is usually in bitcoin, due to it being hard to track.

In this case, the NHS experienced massive failure of their computer and phone systems, this caused widespread confusion as the computers started to show a ransom message demanding $300 bitcoin. As of a result of Friday’s cyber-attack, hospitals, doctors’ offices, and other healthcare institutions, all over the UK had to cancel non-urgent services and start the backup procedures. Multiple emergency rooms spread the word that patients should avoid coming in, if possible. It was all a bit of a mess. Although, no unauthorised access to patient data has been affected so far.


Cyber security experts said the ransomware works as a malware which could spread through computers with unpatched Microsoft Windows. The vulnerability (MS17-010) affects Microsoft Windows Vista, 7, 8, 10, XP and versions of the Windows Server software. They urged that all computers still running this software should run their computers in ‘safe mode’ until they have checked the update blocking the ransomware is installed.

The exploit was released a month ago by a hacking group, Shadow Brokers, in a trove of alleged NSA tools. However, Microsoft released a patch for the exploit, known as MS17-010, in March, but clearly many organisations haven’t caught up, despite the warning. So, should this have been avoided?


Marcus Hutchins was to thank for slowing down the infamous WannaCry malware, as he discovered the so-called “kill switch”, but said, “I’m definitely not a hero”. The 22-year-old works for Los Angeles-based Kryptos Logic security company, who took over the kill switch Friday afternoon, before the virus could fully affect the USA. But added the malware was “poorly designed” – patched together and a “sum of different parts” with an unsophisticated payment system.

If a patched together malware can do this much damage, is this just the first of many major cyber-attacks that we will see happen this year? I believe so, as Bitdefender has already reported having seen a new version of the WannaCry ransomware with the kill switch removed. Let’s hope businesses take this as a warning to take security seriously.

Here’s a timeline of the major hacks over the last few years, some fo which you may not have heard about:


Related Posts

  • Getting on the map with local SEO Using local SEO is an incredibly effective way to market your business online. Why? Because this type of marketing places your products and services right in front of a person who is […]
  • Climb higher than number one with a Position Zero ranking Position Zero SEO is one of the most important techniques in search engine optimisation at the moment, and it’s something we’ve gained quite a reputation for here at First Internet, so we […]