Anatomy of a Breach

Anatomy of a Breach: WannaCry — The Ransomware That Brought the NHS to Its Knees

> series: anatomy_of_a_breach —— part: 101 —— weapon: wannacry —— nhs_trusts_affected: 80 —— appointments_cancelled: 13,500<span class="cursor-blink">_</span>_

Hedgehog Security 31 May 2017 16 min read

The NHS. 80 trusts. 13,500 cancelled appointments. The patch had been available for 59 days.

On 12 May 2017, a ransomware worm called WannaCry began spreading across the internet using the EternalBlue exploit — the NSA tool released by the Shadow Brokers one month earlier. WannaCry was a self-propagating worm: once it infected a single machine on a network, it scanned for other vulnerable Windows systems and spread automatically, encrypting files and demanding a $300 Bitcoin ransom. Within hours, over 200,000 computers across 150 countries were infected, including systems at Telefónica (Spain), Deutsche Bahn (Germany), FedEx (US), Renault (France), and — most devastatingly — the UK's National Health Service.

The National Audit Office's investigation found that 80 NHS trusts in England were affected, along with 595 GP practices. At least 13,500 appointments were cancelled, including 139 urgent referrals that were potentially cancer-related. Five A&E departments diverted patients to other hospitals. MRI scanners, blood-storage refrigerators, and theatre equipment were disrupted. Staff reverted to paper records and whiteboards. The NHS had been warned repeatedly about the risk of running unsupported Windows XP systems and failing to apply security patches. Microsoft had released the MS17-010 patch on 14 March — 59 days before WannaCry struck. The NHS had not applied it.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

One researcher. One domain registration. The world's luckiest break.

WannaCry's global rampage was halted — accidentally — by Marcus Hutchins, a 22-year-old British security researcher known online as MalwareTech. While analysing the malware, Hutchins noticed it attempted to connect to an unregistered domain name before encrypting files. He registered the domain for approximately $10 — and the act of registration activated a kill switch built into the malware, causing it to stop spreading. Hutchins had not known the domain was a kill switch; he registered it as part of routine malware analysis. Had the kill switch not existed — or had Hutchins not registered it — WannaCry would have continued spreading indefinitely.


The UK's healthcare system brought to its knees by a known, patched vulnerability.

NHS Impact Detail
Trusts affected 80 out of 236 NHS trusts in England — 34% of all trusts
Appointments cancelled At least 13,500 — including 139 urgent referrals potentially related to cancer
A&E diversions 5 A&E departments were unable to treat some patients and diverted ambulances
GP practices disrupted 595 GP practices across England
Operations cancelled Approximately 19,500 appointments cancelled in the week following the attack
Windows XP exposure Thousands of NHS computers still running end-of-life Windows XP (unsupported since 2014)
Patch available MS17-010 released 14 March 2017 — 59 days before WannaCry. Cyber Essentials mandates 14-day patching.

Every failure was known, documented, and preventable.

Patch Not Applied in 59 Days
MS17-010 was available for 59 days. <a href="/cyber-essentials">Cyber Essentials Danzell</a> mandates 14-day critical patching. Organisations that met this standard were patched by 28 March — 45 days before WannaCry. The NHS did not meet this standard. Our <a href="/vulnerability-scanning">vulnerability scanning</a> identifies missing critical patches.
Windows XP Still in Production
Thousands of NHS computers ran Windows XP — which had been end-of-life since April 2014 and received no security updates. <a href="/cyber-essentials">Cyber Essentials</a> requires that unsupported software is removed from scope or isolated. The NHS had done neither.
Flat Networks Enabled Propagation
WannaCry spread laterally through flat NHS networks — once inside one trust, it could reach every connected system. Network segmentation would have contained the outbreak. Our <a href="/penetration-testing/infrastructure">infrastructure testing</a> validates segmentation.
Warnings Were Ignored
NHS Digital, the National Data Guardian, and the Care Quality Commission had all warned the NHS about its cybersecurity vulnerabilities prior to WannaCry. The <a href="/blog/anatomy-of-a-breach-nhs-trust-fines-2011">pattern of NHS data losses</a> documented throughout this series — from 2009 onwards — made the vulnerability clearly foreseeable.

WannaCry was entirely preventable.

WannaCry is the single most important case study in the history of UK cybersecurity. A known vulnerability, with a patch available for 59 days, exploiting unsupported operating systems that had been flagged as a risk for years, spreading through unsegmented networks that had never been properly tested — and the result was the largest disruption to NHS services since its founding. Every element of the failure was preventable with controls that existed, were documented, and were available.

For every UK organisation — and especially for healthcare — the controls are the same ones this series has advocated for nine years: Cyber Essentials certification (14-day patching, MFA, unsupported software removal), penetration testing (validating that controls work), vulnerability scanning (identifying missing patches), SOC in a Box for Healthcare (continuous monitoring), and UK Cyber Defence incident response (managing the crisis when it arrives). WannaCry proved that these are not optional investments — they are the controls that determine whether the NHS can treat patients.


WannaCry was preventable. Every element. Every failure. The patch was available. Was yours applied?

<a href="/cyber-essentials">Cyber Essentials</a>: 14-day patching, MFA, no unsupported software. <a href="/vulnerability-scanning">Vulnerability scanning</a>: find missing patches. <a href="/penetration-testing">Penetration testing</a>: validate controls. <a href="https://www.socinabox.co.uk">SOC in a Box</a>: monitor 24/7. Because the next WannaCry will not have a kill switch.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles