Panda Adaptive Defense
sees what others don’t

#WannaCry Cyberattack Anatomy

Our team of security experts has confirmed that the "WannaCry" attack began through the remote execution of EternalBlue, a hacking tool used to exploit a vulnerability of Microsoft Windows. The aim of the attack is to encrypt the computer's data files and demand a $300 ransom for their recovery.

#WannaCry Cyberattack Anatomy

Adaptive Defense Cyber-kill-chain on WannaCry attack

What makes this attack different from others we’ve seen in the past?

The critical nature of this campaign can be chalked up to the exploitation of a vulnerability. In other words, it does not necessarily require human intervention, such as opening an email or downloading something from the internet, to gain entry to a system.

This method made the following possible:

  • The attack took place practically simultaneously on the whole planet: a massive attack without human barriers
  • Infection of a single computer can end up compromising any Windows devices connected to the same network.

Traditional anti-malware protection is incapable of blocking attacks that take advantage of this or other vulnerabilities.

Adaptive Defense stops what others cannot

The platform uses contextual intelligence to reveal patterns of malicious behavior and launch advanced cyberdefense actions against known and unknown threats.

It analyzes, categorizes, and correlates all of the data it collects to carry out Prevention, Detection, Remediation, and Response tasks.

Next-Generation Endpoint Security

Advanced cyber-security to counter malware, with prevention, detection and remediation capabilities.

Endpoint Detection and Response

Monitoring, collecting and categorization of 100% of the active processes on all the organization’s endpoints

Malware Intelligence Platform

The correlation of data on cyber-threats configures a security intelligence system able to uncover patterns of malicious behavior.

#WannaCry in Numbers

  • +230K

    Computers infected all over the world

  • 300$

    Per computer demanded by Ransomware

  • 150

    Countries and 28 languages

  • 0

    Customer impact with Adaptive Defense

Our 6 Key Recommendations for Staying Protected against Cyberattacks:

#1

Only trust the best Next-Generation Endpoint Protection solutions such as Adaptive Defense and Adaptive Defense 360.

#2

Keep your IT infrastructure up to date in every regard: operating systems, software, and firmware on devices. Avoid WannaCry with this update:

#3

In case of new massive attacks, activate Lock mode on Adaptive Defense.

Only run trusted programs verified by Panda Security.

#4

Make systematic backups of your data and make sure that they are not web-based.

#5

Analyze all incoming and outgoing emails to detect and filter executable files so that they do not make it to the end user.

#6

Filter spam so that phishing emails do not reach end users.

Research & Comparatives

WannaCry Report

Learn about all the details in Panda Security’s technical report.

DOWNLOAD
Cyber Kill Chain

A breakdown of the attack stages.

DOWNLOAD
Security Guide

Download our Security Guide here and stay safe.

DOWNLOAD

Videos

VideosWATCH VIDEOAdaptive Defense:The difference between being a victim of a zero-day attack or not.

Adaptive Defense’s security model, based on the monitoring and control of all running processes, is the only protection against any kind of attack, known or unknown. In this way, Adaptive Defense has proved to be the difference between being a victim of a zero-day attack, such as WannaCry, or not being one.

Stop breaches with Panda Adaptive Defense TALK TO AN EXPERT