The Story
It started like a digital sneeze.
One infected machine. One unpatched vulnerability. One exploit leaked from a government stockpile.
Within hours, entire networks around the world were coughing up red ransom screens.
Hospitals.
Banks.
Shipping companies.
Telecoms.
Factories.
Railways.
Everything that could blink or beep was suddenly held hostage.
WannaCry used EternalBlue, a Windows exploit pulled straight out of the NSA’s toolkit and dropped online by the Shadow Brokers like some chaotic “free sample.”
The ransomware didn’t spread like normal malware.
It didn’t need phishing emails.
It didn’t need user interaction.
It spread like wildfire leaping from tree to tree — finding vulnerable SMB ports, infecting, encrypting, and moving on. It was the worst kind of digital pandemic: self-replicating.
In the UK, nurses returned from lunch to find patient charts encrypted. Ambulances were rerouted. Surgeries were canceled. Windows XP machines inside medical devices froze with ransom demands glowing ominously.
And then — salvation from the most unexpected hero:
A young British security researcher checking traffic noticed WannaCry was querying a nonsense domain name. Out of curiosity, he registered the domain for $10.
That $10 purchase accidentally triggered the malware’s kill switch and stopped the pandemic cold.
Aftermath
- Hundreds of thousands of machines infected
- $4–8 billion in global damages
- North Korea was blamed
- EternalBlue became infamous overnight
Global Impact
- Became the “wake-up slap” for mass patching
- Governments questioned hoarding zero-days
- Ransomware became a top-tier global threat
One guy buying a domain defeated the most disruptive ransomware in history.


