WannaCry Attack in FedEx: Risk Identification, Assessment, and Resolution
VerifiedAdded on  2023/06/10
|10
|2676
|81
AI Summary
This report elaborates the WannaCry Ransomware attack that took place in FedEx organization. The report defines the pre-incident, post-incident and the problems that were faced by FedEx during the WannaCry attack. It also includes risk identification, assessment, and resolution.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CORPORATE RISK MANAGEMENT
Wannacry Attack
Name of Student-
Name of University-
Author’s Note-
Wannacry Attack
Name of Student-
Name of University-
Author’s Note-
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1CORPORATE RISK MANAGEMENT
Introduction
Recent survey in U.S. discovered that many organization in United States were attacked
by the WannaCry ransomware attack. The ransomware attack targets the computer that runs
Microsoft Windows operating system. These encrypts data as well as demands for the ransom
payment, mainly in Bitcoin cyptocurrency (Ganame et al., 2017). WannaCry propagates via
EthernalBlue in the Microsoft. WannaCry Ransomware attack has engulfed many of the
organizations in United Kingdom. The government of UK have introduced resilience plans
alerting all the organization and also set action plan for improving the resilience.
This report elaborates the WannaCry Ransomware attack that took place in FedEx
organization The FedEx Corporation had a financial damage of about 300$ million. The FedEx
Corporation deals with delivery around the world. With the attack of virus in the computer
system of the corporation, the delivery was slowed down. This report defines the pre-incident,
post-incident and the problems that were faced by FedEx during the WannaCry attack.
Pre-Incident of WannaCry attack in FedEx (Risk Identification)
FedEx is basically a courier service which is abbreviated from Federal Express (Wirth
2018). The corporation is well known for its shipping system and is also includes a system that
can track the packages with real time. On June 28 2017, FedEx experience some issues with
Microsoft Corp Windows. Some of its systems were interfered with Windows system that were
caused by some malware. In the WannaCry Ransomware attack, all total of 300,000 machines
over 150 countries were impacted. FedEx had to face major result due to the Ransomware attack.
Their delivery service slowed down which infected their services over the whole world (Taddeo
& Floridi, 2018). The malware of WannaCry attacked FedEx through a product of Ukrainian tax
Introduction
Recent survey in U.S. discovered that many organization in United States were attacked
by the WannaCry ransomware attack. The ransomware attack targets the computer that runs
Microsoft Windows operating system. These encrypts data as well as demands for the ransom
payment, mainly in Bitcoin cyptocurrency (Ganame et al., 2017). WannaCry propagates via
EthernalBlue in the Microsoft. WannaCry Ransomware attack has engulfed many of the
organizations in United Kingdom. The government of UK have introduced resilience plans
alerting all the organization and also set action plan for improving the resilience.
This report elaborates the WannaCry Ransomware attack that took place in FedEx
organization The FedEx Corporation had a financial damage of about 300$ million. The FedEx
Corporation deals with delivery around the world. With the attack of virus in the computer
system of the corporation, the delivery was slowed down. This report defines the pre-incident,
post-incident and the problems that were faced by FedEx during the WannaCry attack.
Pre-Incident of WannaCry attack in FedEx (Risk Identification)
FedEx is basically a courier service which is abbreviated from Federal Express (Wirth
2018). The corporation is well known for its shipping system and is also includes a system that
can track the packages with real time. On June 28 2017, FedEx experience some issues with
Microsoft Corp Windows. Some of its systems were interfered with Windows system that were
caused by some malware. In the WannaCry Ransomware attack, all total of 300,000 machines
over 150 countries were impacted. FedEx had to face major result due to the Ransomware attack.
Their delivery service slowed down which infected their services over the whole world (Taddeo
& Floridi, 2018). The malware of WannaCry attacked FedEx through a product of Ukrainian tax
2CORPORATE RISK MANAGEMENT
software. The financial damage due to the malware attack faced by FedEx was about $300
million. Mainly the TNT unit of the FedEx was affected and needed most advanced technologies
for the recovery.
Along with the financial damage, the corporation also faced slower shipments due to the
computer virus and the TNT unit of the organization was forced to do all the transaction through
hand. The cyber-attack that took place in FedEx prompted the corporation to accelerate all
process for combining the TNT unit with the unit of Express air shipping. This was done to
reduce the exposure to other technology systems. Before the incident took place, FedEx
Corporation acquired TNT for about $4.8 billion in 2016, having a spread parcel-delivery system
all over Europe so that it can compete with other delivery services in Europe (Mansfield-Devine,
2017). Just before the cyber-attack, FedEx reported the results of TNT as the part of Express
Division. The TNT unit of the FedEx Corporation mainly serves automotive, industrial, high tech
industries as well as in health-care industries.
The TNT unit of the shipping company was affected by virus that has affected all the
computer system in United States, Asia, and Europe. More than 200 countries takes service from
FedExWith the cyber-attack in the corporation, the TNT unit has experienced disrupted working
process in its operations and in the communication system (Bouda, 2017). As FedEx TNT
Express provided services to all the domestic country and to the regional network, due to the
WannaCry ransomware attack, all those working were slowed down.
software. The financial damage due to the malware attack faced by FedEx was about $300
million. Mainly the TNT unit of the FedEx was affected and needed most advanced technologies
for the recovery.
Along with the financial damage, the corporation also faced slower shipments due to the
computer virus and the TNT unit of the organization was forced to do all the transaction through
hand. The cyber-attack that took place in FedEx prompted the corporation to accelerate all
process for combining the TNT unit with the unit of Express air shipping. This was done to
reduce the exposure to other technology systems. Before the incident took place, FedEx
Corporation acquired TNT for about $4.8 billion in 2016, having a spread parcel-delivery system
all over Europe so that it can compete with other delivery services in Europe (Mansfield-Devine,
2017). Just before the cyber-attack, FedEx reported the results of TNT as the part of Express
Division. The TNT unit of the FedEx Corporation mainly serves automotive, industrial, high tech
industries as well as in health-care industries.
The TNT unit of the shipping company was affected by virus that has affected all the
computer system in United States, Asia, and Europe. More than 200 countries takes service from
FedExWith the cyber-attack in the corporation, the TNT unit has experienced disrupted working
process in its operations and in the communication system (Bouda, 2017). As FedEx TNT
Express provided services to all the domestic country and to the regional network, due to the
WannaCry ransomware attack, all those working were slowed down.
3CORPORATE RISK MANAGEMENT
During the Incident When WannaCry took place in FedEx Corporation (Risk
Assessment)
The TNT Express unit of the FedEx Corporation has impact of about $300 million during
the cyber-attack of WannaCry (Ringwood, 2017). Many computers over almost 74 countries are
infected by the WannaCry ransomware attack. During the ransomware attack, the hacker mainly
locks the computer system of the user and demands money for unlocking them. Same happened
with the FedEx Corporation. Risk assessment that FedEx faced was all the computer system that
the organization was using was locked by the attackers and the hackers demanded money for
unlocking them. The WannaCry attack that took place was huge. During the incident, the
organization experienced an interference in some of its system which were having windows
operating system (Nissim et al., 2018). Malware mainly infected those system having Windows
Operating system. The malware kept on spreading until the systems were turned off.
SwiftonSecurity, which is a leading website of cybersecurity instructed all the
employees of FedEx Corporation to turn off their system as soon as possible and prevent the
malware from being spread. The characteristics of WannaCry ransomware is to spread via
many computer network. It mainly affects the Windows based systems and encrypts all the
files on the system or on the connected hard drive. After getting the access of the files on the
system, the users are stopped from accessing the files and are demanded money for unlocking the
files. The demand for the ransom payment is usually demanded in bitcoin for releasing them
(Wirth, 2017). The WannaCry attack that took place in FedEx consists of many components. It
mainly attacked a computer system of the corporation like a dropper and starts spreading to
all other systems that are turned on. The Windows that use the SMB (Server Message Block)
During the Incident When WannaCry took place in FedEx Corporation (Risk
Assessment)
The TNT Express unit of the FedEx Corporation has impact of about $300 million during
the cyber-attack of WannaCry (Ringwood, 2017). Many computers over almost 74 countries are
infected by the WannaCry ransomware attack. During the ransomware attack, the hacker mainly
locks the computer system of the user and demands money for unlocking them. Same happened
with the FedEx Corporation. Risk assessment that FedEx faced was all the computer system that
the organization was using was locked by the attackers and the hackers demanded money for
unlocking them. The WannaCry attack that took place was huge. During the incident, the
organization experienced an interference in some of its system which were having windows
operating system (Nissim et al., 2018). Malware mainly infected those system having Windows
Operating system. The malware kept on spreading until the systems were turned off.
SwiftonSecurity, which is a leading website of cybersecurity instructed all the
employees of FedEx Corporation to turn off their system as soon as possible and prevent the
malware from being spread. The characteristics of WannaCry ransomware is to spread via
many computer network. It mainly affects the Windows based systems and encrypts all the
files on the system or on the connected hard drive. After getting the access of the files on the
system, the users are stopped from accessing the files and are demanded money for unlocking the
files. The demand for the ransom payment is usually demanded in bitcoin for releasing them
(Wirth, 2017). The WannaCry attack that took place in FedEx consists of many components. It
mainly attacked a computer system of the corporation like a dropper and starts spreading to
all other systems that are turned on. The Windows that use the SMB (Server Message Block)
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4CORPORATE RISK MANAGEMENT
Protocol of the system that are windows-based. The main advantage of the SMB protocol helps
different nodes to communicate on a network.
The National Security Agency of U.S. discovered the vulnerability of the ransomware
malware and developed code for exploiting the malware. The code is called EternalBlue. The
WannaCry Ransomware (O'Connell, 2018). This ransomware does not sent spam emails to the
victims for getting the access of the system. NSA discovered vulnerability known as EternalBlue
in the Windows operating system. This attack takes place when the users do the update of the
application and the WannaCry ransomware gets the chance to exploit SMB protocol in the
Windows Machine. During the attack of the ransomware WannaCry. The ransomware propagate
through the infected systems through EternalBlue that mainly exploits the SMB protocol in
Windows. The attack in the FedEx Corporation runs a script without the interaction of the user
and runs them in the system. The script is known as DoublePulsar, which is an important
backdoor tool developed by NSA (Floridi, 2017). As a result of the cyber-attack, the employees
were instructed to turn off their computer systems and stop the spreading of the malware. During
the attack, the delivery system of the FedEx went slow along with a slow tracking details. In this
WannaCry ransomware attack, many organization were affected that also includes the healthcare
system of the United Kingdom.
Post-Incident for the Attack (Risk Resolution)
After the FedEx Corporation confirmed that a malware attack had taken place in
organization, after that risk resolution were taken to prevent the attack or spread the malware.
The attack took place mainly in the systems which were windows based due to the malware and
the organization was trying to fix those issues as soon as possible. To fix the issues, some risk
resolution was taken. Risk resolution that was taken was when the security team got to know that
Protocol of the system that are windows-based. The main advantage of the SMB protocol helps
different nodes to communicate on a network.
The National Security Agency of U.S. discovered the vulnerability of the ransomware
malware and developed code for exploiting the malware. The code is called EternalBlue. The
WannaCry Ransomware (O'Connell, 2018). This ransomware does not sent spam emails to the
victims for getting the access of the system. NSA discovered vulnerability known as EternalBlue
in the Windows operating system. This attack takes place when the users do the update of the
application and the WannaCry ransomware gets the chance to exploit SMB protocol in the
Windows Machine. During the attack of the ransomware WannaCry. The ransomware propagate
through the infected systems through EternalBlue that mainly exploits the SMB protocol in
Windows. The attack in the FedEx Corporation runs a script without the interaction of the user
and runs them in the system. The script is known as DoublePulsar, which is an important
backdoor tool developed by NSA (Floridi, 2017). As a result of the cyber-attack, the employees
were instructed to turn off their computer systems and stop the spreading of the malware. During
the attack, the delivery system of the FedEx went slow along with a slow tracking details. In this
WannaCry ransomware attack, many organization were affected that also includes the healthcare
system of the United Kingdom.
Post-Incident for the Attack (Risk Resolution)
After the FedEx Corporation confirmed that a malware attack had taken place in
organization, after that risk resolution were taken to prevent the attack or spread the malware.
The attack took place mainly in the systems which were windows based due to the malware and
the organization was trying to fix those issues as soon as possible. To fix the issues, some risk
resolution was taken. Risk resolution that was taken was when the security team got to know that
5CORPORATE RISK MANAGEMENT
FedEx was facing such a problem, then the team instructed all its employees to turn off their
computers to stop the spreading of the malware (Ioanid, Scarlat & Militaru, 2018). With turning
off the systems connected over same network, stops the spreading of the malware primarily. The
shares of FedEx fell to about 3.4 percent which had a great impact on the financial report of
FedEX. The attack was mostly done in the TNT Express area of FedEx.
After the data breach, the customers are experiencing service delays as well as invoicing
delays. As all the auto processes were turned off, the customers were getting manual service
and a particular portion of the TNT operation was facilitated by manual processes. This also
hampered the functions of customer service (Mattei, 2017). The restoration process is a long
term process and the services of the TNT unit took much longer time to be restored. Many
contingency plans were being made to lessen the impacts on the customers who are connected
with TNT networks and FedEx Express.
There were no data breach or any kind of data loss in the organization. As the company
was not having cyber insurance to replace these attacks, it was good for the organization that it
has not faced any data breach (Dwyer, 2018). The company is facing big financial hit with the
rivals of the DHL and the UPS so that they can get benefit from the attack. These rivals were
used to overcome the TNT system that were hit by the WannaCry attack.
Business Continuity Plan
There are many ways through which the WannaCry attack can be avoided. The following
are the techniques that can be implemented for preventing a WannaCry attack. FedEx should
have used these techniques to avoid such attack.
FedEx was facing such a problem, then the team instructed all its employees to turn off their
computers to stop the spreading of the malware (Ioanid, Scarlat & Militaru, 2018). With turning
off the systems connected over same network, stops the spreading of the malware primarily. The
shares of FedEx fell to about 3.4 percent which had a great impact on the financial report of
FedEX. The attack was mostly done in the TNT Express area of FedEx.
After the data breach, the customers are experiencing service delays as well as invoicing
delays. As all the auto processes were turned off, the customers were getting manual service
and a particular portion of the TNT operation was facilitated by manual processes. This also
hampered the functions of customer service (Mattei, 2017). The restoration process is a long
term process and the services of the TNT unit took much longer time to be restored. Many
contingency plans were being made to lessen the impacts on the customers who are connected
with TNT networks and FedEx Express.
There were no data breach or any kind of data loss in the organization. As the company
was not having cyber insurance to replace these attacks, it was good for the organization that it
has not faced any data breach (Dwyer, 2018). The company is facing big financial hit with the
rivals of the DHL and the UPS so that they can get benefit from the attack. These rivals were
used to overcome the TNT system that were hit by the WannaCry attack.
Business Continuity Plan
There are many ways through which the WannaCry attack can be avoided. The following
are the techniques that can be implemented for preventing a WannaCry attack. FedEx should
have used these techniques to avoid such attack.
6CORPORATE RISK MANAGEMENT
1. FedEx should have implemented a security firm and make all its employees install
official patch directly from Microsoft (Mehlman, 2018). The systems that were used by FedEx
Corporation should have been updated with the latest version of operating system. As WannaCry
virus use older version of operating system to carry the attack. For Windows 10, Microsoft had
released security patch. So, to avoid such attack, FedEx Corporation should have used updated
windows.
2. All the application and the Windows that the system had installed on was to have their
auto- updates turned on. This might helped them to avoid any un-updated application the system
and thus prevent WannaCry attack. The auto update feature mainly notifies when update of the
version is available and thus can help to avoid attack. The user can also specify the time of
update and all the applications are updated automatically.
3. The security team of FedEx Corporation should have provided proper training to the
employees of the organization not to download any attachments or not to click on the links that
are attached on the email (Mohurle & Patil, 2017). The employees should have been instructed
not to open the emails from unknown sender to avoid such attacks.
4. All the data on the computer system should have a proper data backup in case of any
data breach. A full backup system can be used to keep the information of the organization safe
and also restoring the data of FedEx Corporation. Many third party solutions are also available
for keeping backup.
Conclusion
The organization that is taken in this report is the FedEx Corporation, which is an import
and export company. The organization is mostly famous for delivering service overnight and has
1. FedEx should have implemented a security firm and make all its employees install
official patch directly from Microsoft (Mehlman, 2018). The systems that were used by FedEx
Corporation should have been updated with the latest version of operating system. As WannaCry
virus use older version of operating system to carry the attack. For Windows 10, Microsoft had
released security patch. So, to avoid such attack, FedEx Corporation should have used updated
windows.
2. All the application and the Windows that the system had installed on was to have their
auto- updates turned on. This might helped them to avoid any un-updated application the system
and thus prevent WannaCry attack. The auto update feature mainly notifies when update of the
version is available and thus can help to avoid attack. The user can also specify the time of
update and all the applications are updated automatically.
3. The security team of FedEx Corporation should have provided proper training to the
employees of the organization not to download any attachments or not to click on the links that
are attached on the email (Mohurle & Patil, 2017). The employees should have been instructed
not to open the emails from unknown sender to avoid such attacks.
4. All the data on the computer system should have a proper data backup in case of any
data breach. A full backup system can be used to keep the information of the organization safe
and also restoring the data of FedEx Corporation. Many third party solutions are also available
for keeping backup.
Conclusion
The organization that is taken in this report is the FedEx Corporation, which is an import
and export company. The organization is mostly famous for delivering service overnight and has
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7CORPORATE RISK MANAGEMENT
a pioneering system, which helps to track the packages and give update of real-time to the users
about their package location in case their packages are lost. FedEx has many other features that
help it to gain an advantage in the market place. FedEx is a delivering service that provides
service the next day within United States and provide an international service that is time-
definite. FedEx operates on largest civil aircraft fights. This report deals with the WannaCry
attack that took place in the organization. The WannaCry attack made the delivery system slower
and effects the customer service. All the details of the incident are described in this report
defining the pre-incident, at the time of incident, and post incident of the WannaCry incident in
FedEx.
a pioneering system, which helps to track the packages and give update of real-time to the users
about their package location in case their packages are lost. FedEx has many other features that
help it to gain an advantage in the market place. FedEx is a delivering service that provides
service the next day within United States and provide an international service that is time-
definite. FedEx operates on largest civil aircraft fights. This report deals with the WannaCry
attack that took place in the organization. The WannaCry attack made the delivery system slower
and effects the customer service. All the details of the incident are described in this report
defining the pre-incident, at the time of incident, and post incident of the WannaCry incident in
FedEx.
8CORPORATE RISK MANAGEMENT
References
Boudar, O. (2017, October). Network behavioral analysis for zero-day malware detection–a case
study. In Intelligent, Secure, and Dependable Systems in Distributed and Cloud
Environments: First International Conference, ISDDC 2017, Vancouver, BC, Canada,
October 26-28, 2017, Proceedings(Vol. 10618, p. 169). Springer.
Dwyer, A. (2018). The NHS cyber-attack: A look at the complex environmental conditions of
WannaCry. RAD Magazine, 44, 25-26.
Floridi, L. (2017). The unsustainable fragility of the digital, and what to do about it. Philosophy
& Technology, 30(3), 259-261.
Ganame, K., Allaire, M. A., Zagdene, G., & Boudar, O. (2017, October). Network Behavioral
Analysis for Zero-Day Malware Detection–A Case Study. In International Conference
on Intelligent, Secure, and Dependable Systems in Distributed and Cloud
Environments (pp. 169-181). Springer, Cham.
Ioanid, A., Scarlat, C., & Militaru, G. (2017, September). The Effect of Cybercrime on
Romanian SMEs in the Context of Wannacry Ransomware Attacks. In European
Conference on Innovation and Entrepreneurship (pp. 307-313). Academic Conferences
International Limited.
Mansfield-Devine, S. (2017). Ransomware: the most popular form of attack. Computer Fraud &
Security, 2017(10), 15-20.
Mattei, T. A. (2017). Privacy, Confidentiality, and Security of Health Care Information: Lessons
from the Recent WannaCry Cyberattack. World neurosurgery, 104, 972-974.
References
Boudar, O. (2017, October). Network behavioral analysis for zero-day malware detection–a case
study. In Intelligent, Secure, and Dependable Systems in Distributed and Cloud
Environments: First International Conference, ISDDC 2017, Vancouver, BC, Canada,
October 26-28, 2017, Proceedings(Vol. 10618, p. 169). Springer.
Dwyer, A. (2018). The NHS cyber-attack: A look at the complex environmental conditions of
WannaCry. RAD Magazine, 44, 25-26.
Floridi, L. (2017). The unsustainable fragility of the digital, and what to do about it. Philosophy
& Technology, 30(3), 259-261.
Ganame, K., Allaire, M. A., Zagdene, G., & Boudar, O. (2017, October). Network Behavioral
Analysis for Zero-Day Malware Detection–A Case Study. In International Conference
on Intelligent, Secure, and Dependable Systems in Distributed and Cloud
Environments (pp. 169-181). Springer, Cham.
Ioanid, A., Scarlat, C., & Militaru, G. (2017, September). The Effect of Cybercrime on
Romanian SMEs in the Context of Wannacry Ransomware Attacks. In European
Conference on Innovation and Entrepreneurship (pp. 307-313). Academic Conferences
International Limited.
Mansfield-Devine, S. (2017). Ransomware: the most popular form of attack. Computer Fraud &
Security, 2017(10), 15-20.
Mattei, T. A. (2017). Privacy, Confidentiality, and Security of Health Care Information: Lessons
from the Recent WannaCry Cyberattack. World neurosurgery, 104, 972-974.
9CORPORATE RISK MANAGEMENT
Mehlman, M. (2018). How CFOs Can Mitigate the Risk of Ransomware. Tax Executive, 70, 92.
Mohurle, S., & Patil, M. (2017). A brief study of wannacry threat: Ransomware attack
2017. International Journal of Advanced Research in Computer Science, 8(5).
Nissim, N., Mahler, T., Shalom, E., Goldenberg, I., Hasman, G., Makori, A., ... & Shahar, Y.
(2018). Know Your Enemy: Characteristics of Cyber-Attacks on Medical Imaging
Devices. arXiv preprint arXiv:1801.05583.
O'Connell, D. (2018). The tower and the square: Understanding hierarchies and networks for
improved organisational governance. Governance Directions, 70(4), 191.
Ringwood, F. (2017). I come to you not by chance. Water&Sanitation Africa, 12(5), 16-19.
Taddeo, M., & Floridi, L. (2018). Regulate artificial intelligence to avert cyber arms
race. Nature, 556(7701), 296-298.
Wirth, A. (2017). It's Time for Belts and Suspenders. Biomedical instrumentation &
technology, 51(4), 341-345.
Wirth, A. (2018). The Times They Are a-Changin': Part Two. Biomedical instrumentation &
technology, 52(3), 236-240.
Mehlman, M. (2018). How CFOs Can Mitigate the Risk of Ransomware. Tax Executive, 70, 92.
Mohurle, S., & Patil, M. (2017). A brief study of wannacry threat: Ransomware attack
2017. International Journal of Advanced Research in Computer Science, 8(5).
Nissim, N., Mahler, T., Shalom, E., Goldenberg, I., Hasman, G., Makori, A., ... & Shahar, Y.
(2018). Know Your Enemy: Characteristics of Cyber-Attacks on Medical Imaging
Devices. arXiv preprint arXiv:1801.05583.
O'Connell, D. (2018). The tower and the square: Understanding hierarchies and networks for
improved organisational governance. Governance Directions, 70(4), 191.
Ringwood, F. (2017). I come to you not by chance. Water&Sanitation Africa, 12(5), 16-19.
Taddeo, M., & Floridi, L. (2018). Regulate artificial intelligence to avert cyber arms
race. Nature, 556(7701), 296-298.
Wirth, A. (2017). It's Time for Belts and Suspenders. Biomedical instrumentation &
technology, 51(4), 341-345.
Wirth, A. (2018). The Times They Are a-Changin': Part Two. Biomedical instrumentation &
technology, 52(3), 236-240.
1 out of 10
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.