Ransomware -Wannacry

What is Ransomeware?

Ransomware is a type of malicious software that carries out the cryptoviral extortion attack from cryptovirology that blocks access to data until a ransom is paid and displays a message requesting payment to unlock it. Simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse. More advanced malware encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them. The ransomware may also encrypt the computer's Master File Table (MFT) or the entire hard drive. Thus, ransomware is a denial-of-access attack that prevents computer users from accessing files since it is intractable to decrypt the files without the decryption key. Ransomware attacks are typically carried out using a Trojan that has a payload disguised as a legitimate file.

WannaCry ransomware attack


The WannaCry ransomware attack is an ongoing cyberattack of the WannaCry (or WannaCrypt, WanaCrypt0r 2.0, Wanna Decryptor]ransomware computer worm, targeting the Microsoft Windows operating system, encrypting data and demanding ransom payments in the cryptocurrency bitcoin.
The attack started on Friday, 12 May 2017 and has been described as unprecedented in scale, infecting more than 230,000 computers in over 150 countries. The worst-hit countries are reported to be RussiaUkraineIndia and Taiwan, but parts of Britain's National Health Service (NHS),Spain's TelefónicaFedExDeutsche Bahn, and LATAM Airlines were hit; along with many others worldwide.


Screenshot of the ransom note left on an infected system





Ransomware usually infects a computer when a user opens a phishing email and, although such emails have been alleged to be used to infect machines with WannaCry,[20] this method of attack has not been confirmed. Once installed, WannaCry uses the EternalBlue exploit and DoublePulsar backdoor developed by the U.S. National Security Agency (NSA)[21][22] to spread through local networks and remote hosts[23], that have not been updated with the most recent security updates, to directly infect any exposed systems.[5][24] A "critical" patch had been issued by Microsoft on 14 March 2017 to remove the underlying vulnerability for supported systems, nearly two months before the attack,[25] but many organizations had not yet applied it.[26]
Those still running exposed older, unsupported operating systems such as Windows XP and Windows Server 2003, were initially at particular risk but Microsoft has now taken the unusual step of releasing updates for these operating systems for all customers.[3][27]
Shortly after the attack began, a web security researcher who blogs as "MalwareTech" unknowingly flipped an effective kill switch by registering a domain name he found in the code of the ransomware. This slowed the spread of infection, but new versions have now been detected that lack the kill switch.

Comments

Popular posts from this blog

Kotlin - The official language for android development.

Free Push Notification using onesignal - Android Part 2

Android DatePicker Example