1. WnnaCry

https://securelist.com/blog/incidents/78351/wannacry-ransomware-used-in-widespread-attacks-all-over-the-world/

https://securelist.com/blog/research/78411/wannacry-faq-what-you-need-to-know-today/

SMB Server Message Block https://en.wikipedia.org/wiki/Server_Message_Block

operates as an application-layer network protocol[3]

and miscellaneous communications between nodes on a network

Most usage of SMB involves computers running Microsoft Windows, where it was known as "Microsoft Windows Network" before the subsequent introduction of Active Directory.

SMB Security Best Practices https://www.us-cert.gov/ncas/current-activity/2017/01/16/SMB-Security-Best-Practices

1.1. Microsoft

Customer Guidance for WannaCrypt attacks

Microsoft solution available to protect additional products

https://docs.microsoft.com/en-us/msrc/customer-guidance-for-wannacrypt-attacks

1.2. piyolog

http://d.hatena.ne.jp/Kango/20170513/1494700355

1.3. Uiwix

https://www.cnet.com/news/wannacry-wannacrypt-uiwix-ransomware-everything-you-need-to-know/

Uiwix

1.4. MBSD

「WannaCry 2.0」の内部構造を紐解く http://www.mbsd.jp/blog/20170518.html

1.5. sophos

How to stay proteced against ransomeware https://www.sophos.com/en-us/medialibrary/Gated%20Assets/white%20papers/sophosransomwareprotectionwpna.pdf?la=en