The Good Tech Companies - WannaCry: When Crypto Was on Most Screens Worldwide
Episode Date: October 30, 2025This story was originally published on HackerNoon at: https://hackernoon.com/wannacry-when-crypto-was-on-most-screens-worldwide. WannaCry froze the world in 2017, but it...s ransom screen also taught millions about Bitcoin—an odd moment when crypto hit most screens on Earth. Check more stories related to web3 at: https://hackernoon.com/c/web3. You can also check exclusive content about #Bitcoin, #ransomware, #wannacry-ransomware-attack, #wannacry, #crypto-security, #crypto-malware, #obyte, #good-company, and more. This story was written by: @obyte. Learn more about this writer by checking @obyte's about page, and for more stories, please visit hackernoon.com. The Wanna Decrypt0r virus locked computers and demanded Bitcoin to unlock them. The ransom note was one of the most recognizable computer messages of the decade. It was frightening, but strangely educational.
Transcript
Discussion (0)
This audio is presented by Hacker Noon, where anyone can learn anything about any technology.
Wanna Cry When Crypto was on most screens worldwide, by Obite. It was Friday, May 12, 2017,
when a lot of people across the world turned on their computers, or even ATMs, ticket machines,
and POS terminals, and got the same nasty surprise. Instead of spreadsheets or hospital patient records,
screens lit up with a black and red ransom note. The note, titled, Wanna Decrypt Zero R,
and later known as WannaCry, said files were locked and the only way back was to pay in Bitcoin.
To top it off, it had two little links at the bottom, about Bitcoin, and how to buy Bitcoin.
For many people, this was the first time they had ever seen the word. In one stroke,
a piece of ransomware managed to give the world a crash course in crypto. It was frightening,
but also strangely educational, and the images of that ransom screen became one of the most
recognizable computer messages of the decade. What was WannaCry? Wanna Cry wasn't the first ransomware,
but it was the one that spread like wildfire. Ransomware is a type of malware that locks up your
files until you pay, and this one was special because it acted like a very infectious worm.
Instead of waiting for someone to download a shady attachment, it jumped from machine to machine
on its own. The victims didn't do anything to catch it. That's what made it so disruptive.
Within two days, over 200,000 computers in more than 150 countries were infected.
It all came from a Windows vulnerability in the file sharing system known as server message block,
SMB. The exploit, called Eternal Blue, was reportedly developed by the U.S. National Security Agency,
NSA, and leaked online by a hacking group called the Shadowbrokers.
Once WannaCry developers had this tool in their hands, it was like finding the master key to office buildings everywhere.
hospitals, universities, factories, government offices, and embedded systems, ATMs, POS
terminals, and other service machines were suddenly at the mercy of the same cartoonish ransom
note. HTTPS colon slash slash X. Com, Antonets, status, 863 quadrillion 166 trillion
195,461,261,238,784. Embeddable equals true, the ransom demanded $300 worth of Bitcoin,
later raised to $600. Victims were told they had three days to pay, or the price would double,
and seven days before their files would be gone forever. It blocked a lot of vital systems, too,
which meant not only were files at stake. The countdown clock on the ransom screen only made the
pressure worse. How it spread and stopped.
What made Wanna Cry so terrifying was the speed.
It didn't just infect one unlucky employee in an office.
It jumped across entire computer networks.
In the UK, the National Health Service, NHS, was one of the hardest hit.
Doctors and nurses found themselves unable to access patient records, surgeries were cancelled,
and ambulances were diverted.
Across the ocean, FedEx reported disruptions, and in Asia, companies like Honda and
Hitachi had to shut down parts of their operations. Over 55 big companies, hospitals,
universities, and governmental organizations reported infections, including the Andra Pradesh
police, India, Deutsche Bonn, German Railway, Darmus Cancer Hospital, Indonesia, the National
Health Institute, Colombia, LATAM Airlines, Chile, the Ministry of Internal Affairs of the Russian
Federation, PetroChina, Portugal Telecom, the Justice Court of Sao Paulo, Telephonicca, Spain,
University of Montreal, Canada, and many more. The total global cost was estimated in billions,
not exactly from ransoms, but for the needed time and money to make the machines operational
again. And yet, the whole thing ended with what might be one of the strangest acts of cyber
heroism in history. A young security researcher named Marcus Hutchins discovered that
the malware checked for a nonsense web domain before spreading. He registered that domain for
about $10, which accidentally triggered the kill switch and slowed the outbreak. It didn't fix
infected machines, but it stopped the worm from claiming new victims. One cheap domain name had
saved thousands of networks. Of course, the story didn't just end with relief. Copycats tweaked
the code Andre leased new versions. Companies scrambled to patch their systems. In governments had
to answer tough questions about why leaked cyber weapons were floating around the internet in the
first place. Screens everywhere. Once the dust settled a bit, want to cry became more than a
cautionary tale. It became a meme. People started pasting the ransom screen on every device they could
find just for fun. Laptops, smartphones, coffee machines, printers, smartwatches. Someone even mocked up
images of the WannaCry screen taking over the bridge consoles on the Star Trek Enterprise.
It was a way of taking back control, turning a nightmare into a joke, and showing that if your files were
gone, at least your sense of humor wasn't. HTTPS colon slash slash x.com, new underscore
orleans jazz, status, 864 quadrillion 133 trillion 471,7171,773,000,511,680. Embedable equals true
the irony is that this strange kind of internet graffiti gave even more invisibility to
the ransom note. And with it, those two little links about Bitcoin. For most of the general public in
2017, Bitcoin was still a mysterious thing that geeks and traders talked about. But here it was,
plastered on office desktops, hospital monitors, and viral memes. Suddenly, the question wasn't,
what is Bitcoin, in a tech forum? It was your boss asking in a panic, how do we buy Bitcoin to
pay for this thing? Evanthaw experts advised against paying and most victims never did. The visibility
was massive. There were thousands of individuals and organizations worldwide with infected computers,
rest also had it on their screens anyway, in the form of news and memes. The aftermath, in the
months after the outbreak, headlines went from shock to analysis. Microsoft and Edward Snowden
publicly criticized governments for stockpiling vulnerabilities instead of disclosing them.
The NHS did a deep review of its outdated systems, eventually investing more in cyber defense,
but not as much ASRI commented. Security firms and researchers released endless write-ups about the
want to cry and how to avoid the next disaster. A key to recover encrypted files for free was
released as well. On the other hand, a copycat for Android devices targeted users in China.
On the crypto side, things got a bit complicated. Bitcoin got a reputation problem, again,
because let's not forget Silk Road. To people who had only heard about it through WannaCry,
it sounded like the currency of criminals. At the same time, coverage about tracking the ransom
wallets showed that Bitcoin wasn't as untraceable as many had thought. Investigators could follow
the flow of coins on the blockchain, even if they couldn't always reach the people behind it.
Over the years, sadly, hackers received around 54, 6 BTC, that'd be around $6,2 million today,
in some of the wallets tied to this malware. By the end of 2017, the year of Wannockry,
Bitcoin also hit its first huge price rally, soaring to almost $20,000. For better,
Better or worse, it was the year crypto broke into mainstream news, and that ransom screen
with its bright Bitcoin logos was part of the story.
Lessons and odd legacies.
Looking back, Wanna Cry feels like one of those moments when the world woke up to two things
at once, the dangers of neglected cybersecurity, and the strange new reality of cryptocurrencies.
For every office that scrambled to install patches, there was a kitchen table where someone
asked what Bitcoin was.
And for every hospital crisis meeting, there was a meme of the ransom number.
note taped onto a smart fridge. As dark as it was, the episode put crypto on the map.
It proved that money native to the internet could appear in unexpected places, good or bad.
Bitcoin's name was widespread, and this eased the discovery of other crypto networks.
Other projects were already experimenting with different approaches to decentralization.
Obite, for instance, had launched months earlier in 2016.
At the time, it was distributing most of its supply to Bitcoin holders, linking its growth
tow Bitcoin's early community. Unlike the Bitcoin blockchain, Obite is based on a directed acyclic
graph, DAG, designed to be censorship-resistant from the beginning. Over the years, this turned
out to be important. Ransomware attacks have decreased, while censorship and surveillance emerged
as major global concerns. What was once seen as geeky or shady now looks like part of the
solution. Obite continues to focus on community-driven applications in censorship-resistant payments
and communications. The takeaway is this. Security matters. History is full of odd twists,
and sometimes the scariest stories become the ones people remember with a grin years later.
Wanna Cry will always be remembered as the day Bitcoin landed on screens worldwide.
What people do with crypto since then, from memes to networks like Obite, is the story still
unfolding. Featured Vector Image by FreePig thank you for listening to this Hackernoon story,
read by artificial intelligence. Visit Hackernoon.com.
to read, write, learn and publish.
