What CISOs need to learn from WannaCry

INSUBCONTINENT EXCLUSIVE:
industries, governments and national infrastructure across several continents.The WannaCry ransomware attack became the biggest threat to
the internet since the Mydoom worm in 2004
On May 12, 2017, the worm infected millions of computers, encrypting their files and holding them hostage to a bitcoin payment.Train
stations, government departments, and Fortune 500 companies were hit by the surprise attack
It took them three hours to realize they had inadvertently stopped the attack dead in its tracks
online, no computer infected with WannaCry would have its files encrypted.But the attack was far from over.In the days following, the
researchers were attacked from an angry botnet operator pummeling the domain with junk traffic to try to knock it offline and two of their
servers were seized by police in France thinking they were contributing to the spread of the ransomware.Worse, their exhaustion and lack of
sleep threatened to derail the operation
The kill switch was later moved to Cloudflare, which has the technical and infrastructure support to keep it alive.Hankins described it as
is just one domain failure away from another massive WannaCry outbreak
Just last month two Cloudflare failures threatened to bring the kill switch domain offline