All cases

WannaCry Ransomware

May 2017

RansomwarePeak: DegradationAttribution: High ConfidenceHealthcareTelecommunicationsTransportation
Year
2017
Actor country
North Korea
Target regions
Global
Unpeace score
9

Executive Summary

Self-propagating ransomware that exploited the EternalBlue SMB vulnerability to spread across ~150 countries in hours. The UK's National Health Service was among the hardest hit, with hospitals diverting ambulances and cancelling surgeries. A researcher-activated kill switch slowed propagation, but not before substantial global disruption.

Why This Matters

WannaCry exposed how a leaked intelligence exploit can cascade into a global healthcare crisis, sharpening the policy debate on vulnerability disclosure and the duty to protect civilian systems.

Escalation Profile

7-Dimension Profile

Escalation Ladder

Probing
Intrusion
Disruption
Degradation
Destruction
Strategic

Phases

2017-04
Intrusion

Weaponization of leaked exploit

EternalBlue (leaked from NSA tooling by Shadow Brokers) integrated into a worm-capable ransomware payload.

2017-05-12
Disruption

Global worm propagation

WannaCry spread autonomously via SMBv1, encrypting systems in hospitals, telecoms, railways, and factories across ~150 countries.

2017-05-12
Degradation

Healthcare impact

NHS England diverted ambulances from at least 5 emergency departments; ~19,000 appointments cancelled in one week.

Threshold Crossings

  • First state-linked ransomware to cause widespread disruption to healthcare services
  • Demonstrated risk of weaponized vulnerability stockpiles entering the wild

Restraint Factors

  • Kill switch domain limited further spread once activated
  • Ransomware payment mechanism was poorly designed, suggesting profit was not the primary motive

Attribution Assessment

High ConfidenceLazarus Group, attributed by the US, UK, and allied governments to North Korea's RGB
North Korea
Lazarus GroupHIDDEN COBRA
1. Technical

Threat actor mapped to North Korea based on infrastructure analysis, malware attribution, and operational patterns.

Evidence: Microsoft: Customer Guidance for WannaCrypt Attacks

2. Political / Legal
Public AttributionIndictmentSanctions Imposed
  • Five Eyes + Japan joint attribution to North Korea (Dec 2017)
  • US DOJ indictment of Park Jin Hyok (Sep 2018)
  • Renewed debate over intelligence agency vulnerability equities processes

Sources: NHS England: Lessons Learned Review of WannaCry; White House Press Briefing: Attribution of WannaCry

3. Open Source

No dedicated journalistic sources in dataset. See sources section for full references.

High Confidence” reflects available public evidence. All assessments carry inherent uncertainty and should be read alongside source material.

Unpeace Position

9

Unpeace Score

Composite severity rating on the peace–conflict spectrum

Stable
Contested
Escalatory
03060100

Contributing Dimensions

Escalation peak4/6
Threshold crossings2/4
Governance flags4/8
Sectors affected5/6
Entanglement7/10
Country scope1/6

Coercive Function

Ransomware

Denial of access through encryption — coercive value through economic extortion and operational disruption.

Observed coercive effects

  • First state-linked ransomware to cause widespread disruption to healthcare services
  • Demonstrated risk of weaponized vulnerability stockpiles entering the wild

Entanglement Risk

Entanglement score7

Sectors affected

HealthcareTelecommunicationsTransportationManufacturingMultiple Sectors

Countries / regions

Global

Impact summary

~200,000 systems encrypted in ~150 countries; major disruption to UK NHS, Telefónica, Deutsche Bahn, and others.

Infrastructure Meaning

Malware / tooling

WannaCryEternalBlue

Capability profile

~200,000 systems encrypted in ~150 countries; major disruption to UK NHS, Telefónica, Deutsche Bahn, and others.

3 ATT&CK techniques mapped — see ATT&CK mapping below.

Governance Analysis

Governance Flags

!Norm Violation
APublic Attribution
SSanctions Imposed
IIndictment
UUN Discussion
RRegulatory Change
CInternational Cooperation
DDeterrence Signal

Norms invoked

  • UN GGE 2015 norm against damaging critical infrastructure
  • Duty of care toward healthcare systems in peacetime

Policy responses

  • Five Eyes + Japan joint attribution to North Korea (Dec 2017)
  • US DOJ indictment of Park Jin Hyok (Sep 2018)
  • Renewed debate over intelligence agency vulnerability equities processes

Regulatory changes

  • NHS mandated cyber-resilience upgrades and patching requirements
  • Accelerated global patch-management awareness campaigns

Governance impact assessment

Forced governments to confront the tension between stockpiling vulnerabilities for intelligence and protecting public health infrastructure from the same exploits.

Sources

G

NHS England: Lessons Learned Review of WannaCry

Government2018-02
V

Microsoft: Customer Guidance for WannaCrypt Attacks

Vendor Report2017-05-12
G

White House Press Briefing: Attribution of WannaCry

Government2017-12-19

Sources listed reflect publicly available materials used to construct this case entry. Inclusion does not imply endorsement. Where no URL is provided, the source may be found via its title and date.