Looks like hackers behind the WannaCry ransomware cyberattack, which infected computers across the globe, were not smart after all. According to the company, WannaCry ransomware apparently affected computers that have not applied the patch. After running on a victim's computer, the WannaCry ransomware tries to connect to an unregistered domain. After infecting a computer, the WannaCry ransomware can scan the entire internal network and target other machines by exploiting a recently patched Windows vulnerability. According to the researcher, "a bit of analysis" led him to the discovery of the domain, but finding the kill switch was accidental.
WannaCry ransomware attack
Attack [ edit ][25] Countries initially affectedOn 12 May 2017, WannaCry began affecting computers worldwide. [12][13]WannaCry is believed to use the EternalBlue exploit, which was developed by the U.S. National Security Agency (NSA)[14][15] to attack computers running Microsoft Windows operating systems. [33] Following the attack, Microsoft released a security patch for Windows XP. [18] To deal with the unsupported Windows systems Microsoft has taken the unusual step of releasing updates for the unsupported Windows XP and Windows Server 2003 and patches for Windows 8 operating systems. [66]Microsoft has created security patches for its now-unsupported versions of Windows, including Windows XP, Windows 8 and Windows Server 2003.collected by :Sandra Alex
To follow all the new news about
No comments:
Post a Comment