WannaCry: Everything you need to know about the global ransomware attack

    469
    0
    SHARE

    If you’ve done your best to stay away offline for the past two days so you could actually enjoy your weekend, you undoubtedly now find yourself trying to catch up on all the news surrounding WannaCry ransomware. This unprecedented malware attack began sweeping the globe late last week, and security researchers estimated that nearly 57,000 computers in more than 150 countries were infected by the end of the day on Friday. While the spread of this terrifying ransomware was slowed on Saturday, it was hardly stopped. As of Monday morning, more than 200,000 systems around the world are believed to have been infected.

    wcry

    Every user who was attacked saw this on it’s screen.

    Is the attack over?

    No.

    WannaCry was first discovered on Friday, May 12th, and it had spread to an estimated 57,000 computers in more than 150 different countries around the world by the end of the day. European countries were hit the hardest, and business ground to a halt at several large companies and organizations, including banks, hospitals, and government agencies.

    Wanna Cry, the deadly ransomware has been declared as a critical threat in India.

    Computer Emergency Response Team of India (CERT-In) has red alert warning against this ransomware, which denotes maximum threat level.

    In their warning and guidelines, CERT-In has requested infected users not to pay the ransom to the hackers, as it will make them even more powerful and deadly. CERT-In said, “Individuals or organisations are not encouraged to pay the ransom as this does not guarantee files will be released. Report such instances of fraud to CERT-In and law enforcement agencies,”

    Meanwhile, a 22-year-old researcher, whose alias is MalwareTech, has become an Internet hero after he accidentally stopped the spread of WannaCry ransomware.

    While undergoing research on WannaCry, this researcher located an unregistered domain residing inside the ransomware, and bought it for $10.69. After he pointed the domain to a sinkhole or a server which collects and analyses malware, he discovered that the domain is actually a kill switch, which can be used to control the ransomware.

    Here is the blog post in which our new internet hero explained what he did to stop the massive attack.

    Click Here to Read the Blog Post

    NO COMMENTS

    LEAVE A REPLY