The Return of WannaCry? Why the Ransomware Threatened Boeing
Almost a year old, the WannaCry ransomware still poses a threat to organizations unable to patch or replace their old systems.
April 03, 2018 at 12:23 PM
4 minute read
Boeing headquarters in Chicago. |
On the morning of March 28, the Seattle Times reported the WannaCry ransomware had infiltrated aerospace manufacturer Boeing. The paper cited an internal memo from Mike VanderWel, chief engineer at Boeing. It's hard to imagine a memo more alarming: “It is metastasizing rapidly out of North Charleston and I just heard 777 (automated spar assembly tools) may have gone down,” VanderWel wrote.
But in a statement later that day on Twitter, Boeing pushed back on reports the attack had been extensive. “A number of articles on a malware disruption are overstated and inaccurate,” the statement said. “Our cybersecurity operations center detected a limited intrusion of malware that affected a small number of systems. Remediations were applied and this is not a production or delivery issue.”
The ransomware exploited vulnerabilities in Windows XP, which Microsoft patched shortly after WannaCry started wreaking havoc. Why then didn't Boeing, one of the largest U.S. companies that has been the target of cyberespionage and attacks in the past, fix these well-known flaws in its systems?
Simply put, it may have been too costly for the company to update its systems. Chris Morales, head of security analytics at cybersecurity management solution provider Vectra, noted that for major manufacturers, “tampering with a system that is always running might have a larger impact than patching that system.” Some systems, therefore, are too essential to interrupt, even for cybersecurity protections.
It is also not uncommon to find large manufacturers such as Boeing to still using outdated systems such as Windows XP. “What I have observed across multiple manufacturing companies is that they end up using old systems, not because they want to, but because they built the software to control the robots” and other tools on those old systems, said Raj Rajamani, vice president of product management at SentinelOne.
Boeing officials were mum on the incident specifics. But experts believe they were dealing with a fast-evolving situation, and with systems that could not easily be updated and protected against the ransomware.
Boeing's “memo was sent while the attack was in progress, which to me actually speaks well to their ability to detect and respond to incidents,” Morales added.
The WannaCry ransomware first came on the scene in spring 2017. It targeted a host of worldwide organizations, including the U.K.'s National Health Service and law firm Shutts & Bowen, who was able to successfully protect itself from infiltration.
That Boeing got attacked by WannaCry is of little surprise to most cybersecurity experts. Despite reaching the apex of its infections last spring, WannaCry is likely still hidden around the internet and in IT devices.
“We will actually continue to see further WannaCry incidents in years to come as many systems will remain unpatched and the malware will be lurking on some USB sticks, hidden in emails or embedded on infected websites waiting for an unsuspecting victim to click on it,” said Joseph Carson, chief security scientist at password account management solution provider Thycotic.
But getting infected with WannaCry isn't always a major blow for a company. Should a company have segmented networks, for instance, it may be able to isolate the ransomware, explained Dimitri Sirota, CEO of compliance solutions provider BigID. “You quickly build a firewall around it so it can't go out and spread,” he said.
What's more, if a company has data recovery and backup procedures in place, it can triage the infected systems while getting up and running again with minimal business disruption.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllTrending Stories
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250