At the start of 2017, the infamous hacking group, Shadow Brokers, made waves in cyberspace by publishing a series of documents they claimed were snatched directly from the National Security Agency (NSA). The contents of these documents were rife with sensitive data that cybersecurity experts concurred, could be utilized to compromise a myriad of devices, ranging from smartphones and laptops to smart TVs, thereby giving hackers access to invaluable native information.
Fast forward to May 12th, the world witnessed the devastating deployment of the WannaCry cyber-attack. This malicious attack adversely affected over 200,000 Windows-based systems around the globe. Critical medical facilities in the United States and approximately 48 hospital trusts within the United Kingdom weren’t spared. The fallout from this event underlined the longstanding dispute between tech behemoths such as Apple, Google, and Microsoft, and various security agencies over the contentious notion of embedding backdoors within devices and operating systems.
What is WannaCry?
WannaCry is a malevolent strain of malware, specifically a type of Trojan virus commonly known as “ransomware”. As the name suggests, it infects operating systems, encrypting files stored on devices. Once completed, it then demands the affected party pay a ransom (in the case of WannaCry, $300 in Bitcoins) for the decryption of their files. If the ransom is not paid within three days, the amount doubles to $600, and non-payment after seven days results in the total deletion of user’s data by the virus.
Who was Impacted?
Image source: MalwareTech
This malware emerged scarcely over a month ago, and security researchers estimate that almost 300,000 devices were infected in the initial ten days. It was revealed that affected structures included radiology devices used in both U.K. and U.S. hospitals. These devices, created by Bayer Medrad, enhance medical imaging by monitoring a power injector that assists in the delivery of a contrast agent. However, operations were resumed in less than a day, averting irreversible damage.
How Does This Relate to Apple?
For years, law enforcement agencies have been grappling to unearth vulnerabilities in secured apps, devices, and systems to aid their investigations. This contentious practice was exemplified in the tussle between the FBI and Apple in a bid to unlock an iPhone belonging to the San Bernardino shooter. Apple CEO Tim Cook vehemently opposed this, highlighting that such a backdoor would critically undermine encryption efforts, thereby compromising user’s privacy and security.
In a subsequent interview with ABC, Cook clarified that if a method of embedding a “safe” backdoor existed that didn’t jeopardize personal files, Apple would certainly consider it. However, contending that such a method isn’t currently feasible, Cook reinforced his opposition, emphasizing the need to keep the troves of sensitive data stored in our digital devices, from social security numbers to location data, securely encrypted.
The aspect to underline here is that the WannaCry ransomware was a derivative of the leaked NSA data, which was originally hoarded as a database of cybersecurity vulnerabilities. This reinforces Apple’s decision to deny the FBI, highlighting the dangers of allowing security agencies a backdoor into devices worldwide.
Can the Virus Be Stopped?
No definitive solution yet exists for infected systems. However, cybersecurity and IT support experts have been tirelessly endeavoring to decrypt the ensnared files since the initial outbreak of WannaCry. To prevent your system from falling prey to this menace, it is critical to ensure all systems are updated promptly. Microsoft has also released an additional security update for Windows 8, XP and Server 2003, so users are encouraged to check for updates if they are using these systems.
Alongside Apple, Google and Microsoft have been vocal in their criticism of the behavior demonstrated by the security agencies. Notably, Microsoft publicly denounced the hoarding of vulnerabilities by agencies and governments. The recent incident involving the theft of NSA vulnerabilities only serves to underscore the potential chaos that can ensue should malicious hackers exploit such vulnerabilities.”
In a surprising development, young security researcher Marcus Hutchins inadvertently curtailed the span of the virus, considerably slowing it down by registering a hidden domain name embedded within the WannaCry code as he sought to track its proliferation. Nevertheless, at the time of our report, WannaCry is still actively infecting systems worldwide.
This article was updated in 2025 to reflect modern realities.
Discover more from TechBooky
Subscribe to get the latest posts sent to your email.