Lessons learned from the WannaCry outbreak

Friday 6 October 11:00 - 12:30, Small talks

Razvan Gavrila (ENISA)



The recent WannaCry outbreak has attracted a substantial amount of attention. Both the security research community and the mainstream media have covered the topic extensively. The flood of technical and non-technical information being shared on social media together with a mixture of facts and speculative assessments led to the propagation of fuzzy crowd-sourced analyses in the public domain. Trolling-like attempts, such as patching the malicious binary to disable the kill-switch, propagation of unconfi rmed information by mirroring, and the indistinguishability of authoritative sources from Internet noise could signal the dawn of fake news in cybersecurity.

During the outbreak, ENISA focused on building a coherent narrative and on fact checking the claims which were being made publicly by various entities. Parts of our analysis, have been made available online. Some of the patterns we have seen during the WannaCry outbreak emerged again during the early phases of the (not)(eternal)Petya outbreak. In the context of the Virus Bulletin Conference in Madrid 2017, ENISA would like to open the floor for an honest discussion on:

  • Fake news in the cybersecurity domain
  • The importance of fact checking in cybersecurity
  • Threat information sharing platforms: limits and the importance of context
  • Operational analysis needs and actionable IOCs
  • Ethics in cybersecurity.

The format of the discussions will be based on a series of questions revolving around the mentioned themes, with direct references to the recently witnessed outbreaks. At the end of the session a summary will be prepared by ENISA and shared with the organizers.



Register.jpg

VB2017 OVERVIEW

CALL FOR LAST-MINUTE PAPERS

WHY ATTEND

SPEAKERS

PROGRAMME

REGISTER NOW!

VENUE

BOOK HOTEL

VB2017 DRINKS RECEPTION

VB2017 FOOSBALL TOURNAMENT

2017 PÉTER SZŐR AWARD


Other VB2017 papers

Keynote address: Inside Cloudbleed

John Graham-Cumming (Cloudflare)

In February 2017, Cloudflare was revealed to have been leaking private information including HTTP headers, cookies and POST data…

Mariachis and jackpotting: ATM malware from Latin America

Thiago Marques (Kaspersky Lab)

Fabio Assolini (Kaspersky Lab)

Of all the forms of attack against financial institutions in the world, the ones that are most likely to combine traditional…

Walking in your enemy's shadow: when fourth-party collection becomes attribution hell

Juan Andres Guerrero-Saade (Kaspersky Lab)
Costin Raiu (Kaspersky Lab)

Attribution is complicated under the best of circumstances. Sparse attributory indicators and the possibility of overt…