Tech How-To: Configure Your Firewalls to Block the “WannaCry” Ransomware Attack | Tufin (2024)

PublishedSeptember 18th, 2023 by Avigdor Book

  • Cybersecurity

The massive “WannaCry” ransomware attack, a form of malware, wreaked havoc across the globe in May 2017, impacting at least 150 countries and targeting banks, hospitals, telecom providers, and government institutions. Hackers have exploited operating systems, and zero-day vulnerabilities to launch these cyber threats. While the infosec community has a plethora of security best practices to defend against ransomware attacks, including firewall best practices to block ransomware, antivirus tools, and ransomware protection strategies, let’s take a closer look at exactly what Tufin customers need to know, and the steps they can take to prevent this and other similar ransomware threats in the future.

First, some background on WannaCry

The vulnerability the attackers were exploiting is in the SMB component in Windows, part of Microsoft’s suite of operating systems. Server Message Block (SMB) is a network protocol that provides file and printer sharing services in Windows systems. SMB may be used inside the corporate network for sharing files and printers; however, it should never be allowed beyond the corporate network, especially via remote access over Wi-Fi.

This is so strongly recommended, in fact, that anadvisoryposted in January 2017 by the United States Computer Emergency Readiness Team (US-CERT) recommends blocking “all versions of Server Message Block (SMB) at the network boundary by blocking TCP port 445 with related protocols on UDP ports 137-138 and TCP port 139, for all boundary devices,” following the best multi-factor authentication practices. This measure prevents the WannaCry attack and should be implemented on business and home firewalls, as part of the endpoint protection.

How-to prevent the WannaCry ransomware attack

Configure all your perimeter firewalls (or routers) to block all inbound access to port 445, as part of your network security strategy.

A few points to consider:

  • Configure this rule on your perimeter (also known as “boundary”) firewalls. This will prevent any SMB traffic, including malicious code and ransomware-as-service, from entering or leaving the corporate network.

  • Some firewalls will only offer a “port” field – in this case configure the “port” field as described in the “destination port” field above. Be sure to follow firewall best practices to block ransomware.

  • For zone-based firewalls and endpoint security measures (like Palo Alto Networks and Fortinet), and firewalls that attach their policy or ACL to a network interface (like Cisco ASA), you should configure “source” to the external or untrusted zone/interface and “destination” to the internal zones/interfaces.

  • The best approach is to explicitly block all inbound access to TCP 445 at the top of the rule base to avoid mistakenly opening it up by lower rules.

  • We also recommend blocking port 445 on internal firewalls to segment your network and prevent lateral movement – this will prevent internal spreading of the ransomware.

  • Note that blocking TCP 445 will prevent file and printer sharing, including over apps – if this is required for business, you may need to leave the port open on some internal firewalls or use encryption keys.

  • If file sharing is needed externally (for example, for home users), use a VPN or remote desktop protocol to provide access to it.

  • You may also want to block sensitive data with the host-based firewall like iptables, part of your advanced threat prevention system.

Protect against the Wannacry ransomware attack with Tufin

Tufin provides several tools that allow customers to get a bird’s-eye view of their firewall policies and prepare reports for management:

Tufin’sRule Viewerallows customers to:

  • Quickly scan all firewalls for rules allowing TCP 445 explicitly (also through service groups).

Tufin’sNetwork Topology Mapallows customers to:

  • Test whether traffic on port 445 can enter your networks, as part of the IT security assessment.

  • If your network is properly set up on-premises, use the Interactive Path Analysis capability to examine potential routes from the internet (use 8.8.8.8 as the source) to internal networks.

Tufin’sUnified Security Policyallows customers to:

  • Restrict access between the Internet and internal networks to prohibit TCP 445, as an anti-ransomware strategy.

  • See violations in the SecureTrack+ Dashboard and the Rule Viewer, as part of a ransomware prevention system.

  • Prevent future opening of SMB ports, following ransomware prevention and Sophos encryption methods.

  • For more details on how to define your Unified Security Policy, clickhere.

Additionally, customers can use Tufin’sSecurity Policy Builderto, build and deploy their corporate access network segmentation framework

Wrapping Up

Take action now to protect your network against ransomware attacks! Clickhereto access our demo and witness firsthand how Tufin’s advanced capabilities can scan, assess, and control network access, effectively safeguarding your systems from potential threats. Don’t wait – secure your network’s future today!

Free Firewall Change Tracker Tool

See all your firewall, SDN policy and public cloud security group changes for real-time visibility and control.

Download Now

Tech How-To: Configure Your Firewalls to Block the “WannaCry” Ransomware Attack | Tufin (1)

Don't miss out on more Tufin blogs

Subscribe to our weekly blog digest

Tech How-To: Configure Your Firewalls to Block the “WannaCry” Ransomware Attack | Tufin (2024)

FAQs

How can we prevent WannaCry ransomware attack? ›

Update your software and operating system regularly

Computer users became victims of the WannaCry attack because they had not updated their Microsoft Windows operating system. Had they updated their operating systems regularly, they would have benefited from the security patch that Microsoft released before the attack.

How do firewalls protect against ransomware? ›

Firewalls scan the traffic coming from both sides, examining it for malware and other threats. In this way, a firewall can ascertain where a file came from, where it is headed, and other information about how it traveled and then use that to know whether it is likely to contain ransomware.

How do I get rid of WannaCry ransomware? ›

Home remediation. Malwarebytes can detect and remove Ransom. WannaCrypt without further user interaction. Please download Malwarebytesto your desktop.

How was the WannaCry ransomware stopped? ›

Within hours of the attack, WannaCry was temporarily neutralized. A security researcher discovered a "kill switch" that essentially turned off the malware. However, many affected computers remained encrypted and unusable until the victims paid the ransom or were able to reverse the encryption.

How can ransomware attacks be stopped? ›

Your backup files should be appropriately protected and stored offline or out-of-band so they can't be targeted by attackers. You can use cloud services to help mitigate a ransomware infection, as many of these services retain previous versions of files that allow you to roll back to an unencrypted version.

How do firewalls prevent attacks? ›

Firewalls do this by filtering data in network traffic to protect the network from a wide variety of malicious attacks and malware. Without firewalls to block cyber threats and prevent unauthorized access, computers and devices in your network are susceptible to attack.

Can firewalls block malware? ›

Firewalls do not guarantee that your computer will not be attacked. Firewalls primarily help protect against malicious traffic, not against malicious programs (i.e., malware), and may not protect you if you accidentally install or run malware on your computer.

How does Windows Defender protect against ransomware? ›

Microsoft Defender for Endpoint helps prevent, detect, investigate, and respond to advanced threats, such as ransomware attacks. Next-generation protection and attack surface reduction capabilities in Defender for Endpoint were designed to catch emerging threats.

Which software will help to defend against ransomware? ›

Bitdefender Antivirus Plus is just what you need, combining an award-winning antivirus engine, a set of features specifically aimed at ransomware protection, and a boatload of security bonus features.

What is the 3 2 1 rule for ransomware? ›

3 – Keep three copies of any important file: one primary and two backups. 2 – Keep the files on two different media types to protect against different types of hazards. 1 – Store one copy – or “go bag” – off-site (e.g., outside the home or business facility).

How do I manage ransomware protection on Windows? ›

On your Windows 10 or Windows 11 device, open the Windows Security app. Select Virus & threat protection. Under Ransomware protection, select Manage ransomware protection. If controlled folder access is turned off, you'll need to turn it on.

Can Windows Defender remove WannaCry? ›

Microsoft released a patch, and if you have an old Windows machine that's infected, the best way to remove WannaCry is to update and use Windows Defender or an antivirus tool.

How did Microsoft stop WannaCry? ›

Stopping the spread of WannaCry

One day after the initial attack, Microsoft released a security update for Windows 8, Windows Server 2003 and Windows XP to fix the vulnerability.

What do you do when you get WannaCry? ›

Isolate the system to prevent the malware from compromising additional devices. continue to encrypt files and attempt to spread. Do not connect to or power on unpatched systems on compromised networks. The U.S. Government does not encourage paying a ransom to criminal actors.

How do we protect ourselves from attacks like WannaCry? ›

By using firewalls and password to encrypt all of our data, we can protect ourselves from attackers like Wannacry.

What can government do to prevent ransomware attacks? ›

Disruption and enforcement
  • Attempting to disrupt criminal networks and virtual currency exchanges responsible for ransomware laundering. ...
  • Encouraging improved cybersecurity across the private sector – helping build you're the effective defenses that are vital in ransomware prevention.

How can we prevent aggressive ransomware? ›

Best Preventive Measures Against Ransomware Attacks
  • Have a Data Backup Plan.
  • Install Firewalls & Other Safety Measures.
  • Regular Updating of IT Systems.
  • Educating Your Employees About Cybersecurity in the Workplace.

What are the three ways to protect yourself from ransomware infection? ›

Here are 3 ways you can protect yourself — and Rowan University — from ransomware.
  • ​Apply software updates and regularly restart your computer. It's important to keep your computer — whether it's personal or Rowan-owned — up to date and restart it at least once a week. ...
  • Back up your data. ...
  • Take your security training.

Top Articles
What is Ethereum Classic? Everything you need to know about ETC
Mortgage Down Payment Calculator | Ratehub.ca
NYT Mini Crossword today: puzzle answers for Tuesday, September 17 | Digital Trends
Melson Funeral Services Obituaries
Kevin Cox Picks
Best Team In 2K23 Myteam
Mrh Forum
Body Rubs Austin Texas
Craglist Oc
Katie Boyle Dancer Biography
414-290-5379
Globe Position Fault Litter Robot
Olivia Ponton On Pride, Her Collection With AE & Accidentally Coming Out On TikTok
4302024447
Bc Hyundai Tupelo Ms
Summoner Class Calamity Guide
10 Free Employee Handbook Templates in Word & ClickUp
Best Nail Salon Rome Ga
Enterprise Car Sales Jacksonville Used Cars
History of Osceola County
Richland Ecampus
ELT Concourse Delta: preparing for Module Two
20 Different Cat Sounds and What They Mean
Eine Band wie ein Baum
Iu Spring Break 2024
Albert Einstein Sdn 2023
Ficoforum
Best Town Hall 11
Ordensfrau: Der Tod ist die Geburt in ein Leben bei Gott
Little Einsteins Transcript
The Monitor Recent Obituaries: All Of The Monitor's Recent Obituaries
Diggy Battlefield Of Gods
Calculator Souo
Wake County Court Records | NorthCarolinaCourtRecords.us
1987 Monte Carlo Ss For Sale Craigslist
New York Rangers Hfboards
Bay Focus
Pinellas Fire Active Calls
How To Paint Dinos In Ark
Kelley Blue Book Recalls
Anhedönia Last Name Origin
Gfs Ordering Online
Pulitzer And Tony Winning Play About A Mathematical Genius Crossword
4k Movie, Streaming, Blu-Ray Disc, and Home Theater Product Reviews & News
Marcel Boom X
Paradise leaked: An analysis of offshore data leaks
The 13 best home gym equipment and machines of 2023
M Life Insider
Invitation Quinceanera Espanol
Cheryl Mchenry Retirement
Latest Posts
Article information

Author: Aracelis Kilback

Last Updated:

Views: 6006

Rating: 4.3 / 5 (64 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Aracelis Kilback

Birthday: 1994-11-22

Address: Apt. 895 30151 Green Plain, Lake Mariela, RI 98141

Phone: +5992291857476

Job: Legal Officer

Hobby: LARPing, role-playing games, Slacklining, Reading, Inline skating, Brazilian jiu-jitsu, Dance

Introduction: My name is Aracelis Kilback, I am a nice, gentle, agreeable, joyous, attractive, combative, gifted person who loves writing and wants to share my knowledge and understanding with you.