Saturday, May 13, 2017

Round Two: WannaCry Ransomware That Struck the Globe Is Back according to : Motherboard

On Friday, a variation of the WannaCry ransomware ripped across the globe, infecting UK hospitals, a Spanish telecom company, and companies in various other sectors. CCN-CERT, the Spanish computer emergency response team, released its own tool that it says will stop WannaCry from infecting machines. Update: Originally, this piece included quotes from a second security researcher who tweeted he had found samples without the so-called killswitch. After several hours, the attack was suddenly blocked from spreading much further when a security researcher registered a domain which ordered the malware to stop infecting new machines. Over Friday and Saturday, samples of the malware emerged without that debilitating feature, meaning that attackers may be able to resume spreading ransomware even though a security researcher cut off the original wave.



Round Two: WannaCry Ransomware That Struck the Globe Is Back
This next requires that you look for processes which may relate to the WannaCry ransomware. As for how to remove WannaCry, the above is not 100% guaranteed to do so, yes, it may negate some of the problems it causes. If you or your organization have not been a victim of this WannaCry cyberattack, please do the following now:1. Now, if you or your organization have yet to be infected by this ransomware cyberattack, here are a few tips worth reading. WannaCry Questions AnsweredIf you're unfamiliar with what is still a breaking story, a little background into what this ransomware can do is in order.

The WannaCry Ransomware 'Kill Switch' That Saved Untold PCs From Harm

The kill switch "was supposed to work like that, just the domain should [have been] random so people can't register it."A Temporary FixThe kill switch doesn't help devices WannaCry has already infected and locked down. One possibility: The functionality was put in place as an intentional kill switch, in case the creators ever wanted to rein in the monster they'd created. Curious why the ransomware would look for that domain, MalwareTech registered it himself. All it would take to get around it would be a new strain of WannaCry whose code excludes the kill switch, or relies on a more sophisticated URL generator instead of a static address. Since the domain MalwareTech acquired was supposed to be dormant but went live, WannaCry may have assumed it was in the middle of forensic analysis, and shut down.


collected by :Sandra Alex
To follow all the new news about

VIRUSES and INFECTIONS

No comments:

Post a Comment