> series: anatomy_of_a_breach —— part: 101 —— weapon: wannacry —— nhs_trusts_affected: 80 —— appointments_cancelled: 13,500<span class="cursor-blink">_</span>_
On 12 May 2017, a ransomware worm called WannaCry began spreading across the internet using the EternalBlue exploit — the NSA tool released by the Shadow Brokers one month earlier. WannaCry was a self-propagating worm: once it infected a single machine on a network, it scanned for other vulnerable Windows systems and spread automatically, encrypting files and demanding a $300 Bitcoin ransom. Within hours, over 200,000 computers across 150 countries were infected, including systems at Telefónica (Spain), Deutsche Bahn (Germany), FedEx (US), Renault (France), and — most devastatingly — the UK's National Health Service.
The National Audit Office's investigation found that 80 NHS trusts in England were affected, along with 595 GP practices. At least 13,500 appointments were cancelled, including 139 urgent referrals that were potentially cancer-related. Five A&E departments diverted patients to other hospitals. MRI scanners, blood-storage refrigerators, and theatre equipment were disrupted. Staff reverted to paper records and whiteboards. The NHS had been warned repeatedly about the risk of running unsupported Windows XP systems and failing to apply security patches. Microsoft had released the MS17-010 patch on 14 March — 59 days before WannaCry struck. The NHS had not applied it.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping CallWannaCry's global rampage was halted — accidentally — by Marcus Hutchins, a 22-year-old British security researcher known online as MalwareTech. While analysing the malware, Hutchins noticed it attempted to connect to an unregistered domain name before encrypting files. He registered the domain for approximately $10 — and the act of registration activated a kill switch built into the malware, causing it to stop spreading. Hutchins had not known the domain was a kill switch; he registered it as part of routine malware analysis. Had the kill switch not existed — or had Hutchins not registered it — WannaCry would have continued spreading indefinitely.
| NHS Impact | Detail |
|---|---|
| Trusts affected | 80 out of 236 NHS trusts in England — 34% of all trusts |
| Appointments cancelled | At least 13,500 — including 139 urgent referrals potentially related to cancer |
| A&E diversions | 5 A&E departments were unable to treat some patients and diverted ambulances |
| GP practices disrupted | 595 GP practices across England |
| Operations cancelled | Approximately 19,500 appointments cancelled in the week following the attack |
| Windows XP exposure | Thousands of NHS computers still running end-of-life Windows XP (unsupported since 2014) |
| Patch available | MS17-010 released 14 March 2017 — 59 days before WannaCry. Cyber Essentials mandates 14-day patching. |
WannaCry is the single most important case study in the history of UK cybersecurity. A known vulnerability, with a patch available for 59 days, exploiting unsupported operating systems that had been flagged as a risk for years, spreading through unsegmented networks that had never been properly tested — and the result was the largest disruption to NHS services since its founding. Every element of the failure was preventable with controls that existed, were documented, and were available.
For every UK organisation — and especially for healthcare — the controls are the same ones this series has advocated for nine years: Cyber Essentials certification (14-day patching, MFA, unsupported software removal), penetration testing (validating that controls work), vulnerability scanning (identifying missing patches), SOC in a Box for Healthcare (continuous monitoring), and UK Cyber Defence incident response (managing the crisis when it arrives). WannaCry proved that these are not optional investments — they are the controls that determine whether the NHS can treat patients.
<a href="/cyber-essentials">Cyber Essentials</a>: 14-day patching, MFA, no unsupported software. <a href="/vulnerability-scanning">Vulnerability scanning</a>: find missing patches. <a href="/penetration-testing">Penetration testing</a>: validate controls. <a href="https://www.socinabox.co.uk">SOC in a Box</a>: monitor 24/7. Because the next WannaCry will not have a kill switch.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call