WantToCry Ransomware Abuses SMB Services for Remote Encryption

WantToCry ransomware remotely encrypts via exposed SMB services

Understanding WantToCry Ransomware and SMB Services

WantToCry ransomware abuses SMB services to remotely encrypt files, posing a significant threat to organisations. In recent incidents, attackers have leveraged exposed SMB file-sharing protocols to target businesses, encrypting files without ever dropping malware on the victim’s system. This innovative approach signals a shift in ransomware tactics, making detection and prevention more challenging for IT and security teams.

How WantToCry Ransomware Operates

Unlike traditional ransomware strains, WantToCry does not need to install malicious software on the targeted host. Instead, it exploits weaknesses in the Server Message Block (SMB) protocol, which is commonly used for file sharing within business environments. Attackers remotely access exposed SMB services and encrypt files directly over the network, bypassing many endpoint security tools that rely on detecting malware payloads.

  • No malware is dropped on the host, reducing detection opportunities.
  • Encryption occurs remotely via the SMB protocol.
  • Targets organisations with SMB ports exposed to the internet.
  • Shares its name with WannaCry, but operates differently.

This technique is particularly dangerous because it undermines traditional security approaches that focus on identifying and blocking malware files. The threat actors are not dependent on lateral movement or worm-like propagation, as seen in the original WannaCry attack from 2017.

Why SMB Service Exposure Is a Serious Risk

The risk posed by WantToCry ransomware abuses SMB services is substantial. SMB protocol is widely used for file sharing and network communications, but it is also a frequent target for cybercriminals due to its vulnerabilities. Many organisations inadvertently leave SMB ports open to the internet, either through misconfiguration or legacy systems that require remote access.

The Impact of Remote Encryption Attacks

Remote encryption attacks can have devastating consequences. Without any malware present on local systems, endpoint protection tools are often blind to the attack. This increases the likelihood that files will be encrypted and ransoms demanded before the incident is detected. Furthermore, organisations may struggle to trace the source of the compromise, as logs and alerts related to file access over SMB may not be actively monitored.

  • Files can be targeted across multiple hosts simultaneously.
  • Incident response is complicated by lack of malware artefacts.
  • Recovery efforts may be delayed, prolonging business disruption.
  • Ransom payments may become the only perceived solution.

Exposed SMB services are an attractive target for attackers because they often provide access to sensitive data. If not properly secured, a single compromised service can lead to widespread file encryption across an organisation’s network shares.

Key Steps Organisations Must Take to Mitigate SMB Abuse

With the rise of threats like WantToCry ransomware abuses SMB services, organisations must act swiftly to reduce their exposure. Hardening SMB configurations and monitoring network activity are essential to defending against remote encryption attacks.

Best Practices for Securing SMB Services

To protect against ransomware abusing SMB services, organisations should implement the following measures:

  • Restrict SMB access to trusted internal networks only. Avoid exposing SMB ports (typically 445 and 139) to the internet.
  • Regularly review firewall rules and access controls to ensure only authorised users and systems can connect to SMB services.
  • Disable SMBv1, as this older protocol is particularly vulnerable to attacks. Use SMBv2 or SMBv3 with encryption enabled.
  • Apply security patches and updates to SMB services and underlying operating systems promptly.
  • Monitor SMB network traffic for unusual activity, such as large volumes of file access or unexpected connections.
  • Implement robust backup solutions, ensuring backups are stored offline or in immutable formats to prevent ransomware from encrypting them.
  • Educate staff on the risks of remote file access and encourage reporting of suspicious activity.

These steps help reduce the attack surface and increase the likelihood of detecting malicious activity before files are encrypted.

Incident Response and Recovery Considerations

If your organisation suspects it has been targeted by ransomware abusing SMB services, immediate action is required:

  • Isolate affected systems to prevent further encryption.
  • Conduct forensic analysis of SMB logs to identify the source and scope of the attack.
  • Restore files from offline or immutable backups.
  • Review and strengthen SMB access controls.
  • Report incidents to relevant authorities and share threat intelligence with peers.

Organisations should also review their incident response plans to ensure they address threats that operate remotely and without malware payloads.

Summary: Staying Ahead of Ransomware Trends

WantToCry ransomware abuses SMB services to encrypt files remotely, challenging traditional defences and highlighting the need for improved network security. Organisations must prioritise hardening SMB configurations, monitoring network traffic, and maintaining robust backups to guard against this evolving threat. By reducing exposure and staying vigilant, businesses can minimise the risk posed by remote ransomware attacks.

Originally reported by cybersecuritynews.com.

Share this bulletin

About the Author

Rob McBride Headshot - CyPro Partner and leading cyber security expert

Rob McBride

Partner

Rob McBride

Rob is a Founding Partner at CyPro and a highly experienced CISO. Beginning his career with a successful tenure at Deloitte, Rob has since amassed a wealth of experience, notably serving as a cyber security advisor to the UK government and spearheading cloud security transformations for several global banks.

At CyPro, Rob leads the managed service business line, working extensively across multiple sectors including telecommunications, technology, higher education, travel, and retail. He is passionate about equipping small and medium-sized businesses (SMBs) with robust cyber security strategies to fuel their growth.

View Profile
Back to Bulletins
Category
Published
May 21 - 2026
Post Tags
Cypro firewall showing robust network security
Secure your business.
Elevate your security, accelerate your growth. We take care of cyber security for high-growth companies, at every stage of their journey.
Get in touch

Related News

CyPro Cookie Consent

Hmmm cookies...

Our delicious cookies make your experience smooth and secure.

Privacy PolicyOkay, got it!

We use cookies to enhance your experience, analyse site traffic, and for marketing purposes. For more information on how we handle your personal data, please see our Privacy Policy.

Schedule a Call