Tech How-To: Configure Your Firewalls to Block the “WannaCry” Ransomware Attack | Tufin (2024)

PublishedSeptember 18th, 2023 by Avigdor Book

  • Cybersecurity

The massive “WannaCry” ransomware attack, a form of malware, wreaked havoc across the globe in May 2017, impacting at least 150 countries and targeting banks, hospitals, telecom providers, and government institutions. Hackers have exploited operating systems, and zero-day vulnerabilities to launch these cyber threats. While the infosec community has a plethora of security best practices to defend against ransomware attacks, including firewall best practices to block ransomware, antivirus tools, and ransomware protection strategies, let’s take a closer look at exactly what Tufin customers need to know, and the steps they can take to prevent this and other similar ransomware threats in the future.

First, some background on WannaCry

The vulnerability the attackers were exploiting is in the SMB component in Windows, part of Microsoft’s suite of operating systems. Server Message Block (SMB) is a network protocol that provides file and printer sharing services in Windows systems. SMB may be used inside the corporate network for sharing files and printers; however, it should never be allowed beyond the corporate network, especially via remote access over Wi-Fi.

This is so strongly recommended, in fact, that anadvisoryposted in January 2017 by the United States Computer Emergency Readiness Team (US-CERT) recommends blocking “all versions of Server Message Block (SMB) at the network boundary by blocking TCP port 445 with related protocols on UDP ports 137-138 and TCP port 139, for all boundary devices,” following the best multi-factor authentication practices. This measure prevents the WannaCry attack and should be implemented on business and home firewalls, as part of the endpoint protection.

How-to prevent the WannaCry ransomware attack

Configure all your perimeter firewalls (or routers) to block all inbound access to port 445, as part of your network security strategy.

A few points to consider:

  • Configure this rule on your perimeter (also known as “boundary”) firewalls. This will prevent any SMB traffic, including malicious code and ransomware-as-service, from entering or leaving the corporate network.

  • Some firewalls will only offer a “port” field – in this case configure the “port” field as described in the “destination port” field above. Be sure to follow firewall best practices to block ransomware.

  • For zone-based firewalls and endpoint security measures (like Palo Alto Networks and Fortinet), and firewalls that attach their policy or ACL to a network interface (like Cisco ASA), you should configure “source” to the external or untrusted zone/interface and “destination” to the internal zones/interfaces.

  • The best approach is to explicitly block all inbound access to TCP 445 at the top of the rule base to avoid mistakenly opening it up by lower rules.

  • We also recommend blocking port 445 on internal firewalls to segment your network and prevent lateral movement – this will prevent internal spreading of the ransomware.

  • Note that blocking TCP 445 will prevent file and printer sharing, including over apps – if this is required for business, you may need to leave the port open on some internal firewalls or use encryption keys.

  • If file sharing is needed externally (for example, for home users), use a VPN or remote desktop protocol to provide access to it.

  • You may also want to block sensitive data with the host-based firewall like iptables, part of your advanced threat prevention system.

Protect against the Wannacry ransomware attack with Tufin

Tufin provides several tools that allow customers to get a bird’s-eye view of their firewall policies and prepare reports for management:

Tufin’sRule Viewerallows customers to:

  • Quickly scan all firewalls for rules allowing TCP 445 explicitly (also through service groups).

Tufin’sNetwork Topology Mapallows customers to:

  • Test whether traffic on port 445 can enter your networks, as part of the IT security assessment.

  • If your network is properly set up on-premises, use the Interactive Path Analysis capability to examine potential routes from the internet (use 8.8.8.8 as the source) to internal networks.

Tufin’sUnified Security Policyallows customers to:

  • Restrict access between the Internet and internal networks to prohibit TCP 445, as an anti-ransomware strategy.

  • See violations in the SecureTrack+ Dashboard and the Rule Viewer, as part of a ransomware prevention system.

  • Prevent future opening of SMB ports, following ransomware prevention and Sophos encryption methods.

  • For more details on how to define your Unified Security Policy, clickhere.

Additionally, customers can use Tufin’sSecurity Policy Builderto, build and deploy their corporate access network segmentation framework

Wrapping Up

Take action now to protect your network against ransomware attacks! Clickhereto access our demo and witness firsthand how Tufin’s advanced capabilities can scan, assess, and control network access, effectively safeguarding your systems from potential threats. Don’t wait – secure your network’s future today!

Free Firewall Change Tracker Tool

See all your firewall, SDN policy and public cloud security group changes for real-time visibility and control.

Download Now

Tech How-To: Configure Your Firewalls to Block the “WannaCry” Ransomware Attack | Tufin (1)

Don't miss out on more Tufin blogs

Subscribe to our weekly blog digest

Tech How-To: Configure Your Firewalls to Block the “WannaCry” Ransomware Attack | Tufin (2024)
Top Articles
Latest Posts
Article information

Author: Rev. Porsche Oberbrunner

Last Updated:

Views: 5634

Rating: 4.2 / 5 (53 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Rev. Porsche Oberbrunner

Birthday: 1994-06-25

Address: Suite 153 582 Lubowitz Walks, Port Alfredoborough, IN 72879-2838

Phone: +128413562823324

Job: IT Strategist

Hobby: Video gaming, Basketball, Web surfing, Book restoration, Jogging, Shooting, Fishing

Introduction: My name is Rev. Porsche Oberbrunner, I am a zany, graceful, talented, witty, determined, shiny, enchanting person who loves writing and wants to share my knowledge and understanding with you.