WannaCry Ransomware Attack 2017: Target, Working, Damage, Detection
Added on 2022-12-03
10 Pages2236 Words76 Views
|
|
|
Running head: CYBER OPERATIONS INC
CYBER OPERATIONS INC
Name of the Student
Name of the University
Author Note:
CYBER OPERATIONS INC
Name of the Student
Name of the University
Author Note:
![WannaCry Ransomware Attack 2017: Target, Working, Damage, Detection_1](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fimages%2Fnv%2F4a4df80e2e6545c192e248337c3d163f.jpg&w=3840&q=10)
CYBER OPERATIONS INC1
Table of Contents
Introduction..........................................................................................................................2
Discussion............................................................................................................................2
Target...................................................................................................................................2
Working of the attack..........................................................................................................3
Damage caused by attack.....................................................................................................4
Detection of attack...............................................................................................................4
Perpetrator............................................................................................................................5
Summarize of finding..........................................................................................................6
Conclusion...........................................................................................................................6
References............................................................................................................................8
Table of Contents
Introduction..........................................................................................................................2
Discussion............................................................................................................................2
Target...................................................................................................................................2
Working of the attack..........................................................................................................3
Damage caused by attack.....................................................................................................4
Detection of attack...............................................................................................................4
Perpetrator............................................................................................................................5
Summarize of finding..........................................................................................................6
Conclusion...........................................................................................................................6
References............................................................................................................................8
![WannaCry Ransomware Attack 2017: Target, Working, Damage, Detection_2](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fimages%2Fpy%2F1e01c145d71341679ce341ecd05af189.jpg&w=3840&q=10)
CYBER OPERATIONS INC2
Introduction
In the year 2012, a ransomware attack affected a wide range of sectors which comprises
of government, telecommunication and lastly gas. At present, WannaCry affected around
300,000 systems that are located in 150 countries (Buczak and Guven 2015). Countries like
Russia and China are affected due to this attack as a result of usage of high percentage of
software. The overall spreading of this attack is reported in two days following the launch of the
attack. This has merely taken place as a result of discovery of ‘kill switch’ in their code. The
main motive of this attack is all about encrypting the file, disk and lock-in system (Gupta,
Agrawal and Yamaguchi 2016). This particular malware demanded ransomware of 300-600,
which is paid in around three bitcoins within three days of returning. This is mainly done for
decrypting the files of the user.
The coming pages of the report help us in highlighting the fact that this report is all about
target and working of ransomware attack. After that, damage due to attack and method of
detection of attack has been provided.
Discussion
Target
WannaCry aims to spread by using SMB (Server Message Block) protocol, that operates
in between the port 445 and 139. This is used by windows machine so that they can
communicate with file system on the provided network. With successful installation, this
particular ransomware scans for and makes propagation to some other risk devices (Bada, Sasse
and Nurse 2019). WannaCry mainly tends to assure if double pulsar has already affected the
machine or not. In April, Shadow group disclosed that double Pulsar and external Blue could
Introduction
In the year 2012, a ransomware attack affected a wide range of sectors which comprises
of government, telecommunication and lastly gas. At present, WannaCry affected around
300,000 systems that are located in 150 countries (Buczak and Guven 2015). Countries like
Russia and China are affected due to this attack as a result of usage of high percentage of
software. The overall spreading of this attack is reported in two days following the launch of the
attack. This has merely taken place as a result of discovery of ‘kill switch’ in their code. The
main motive of this attack is all about encrypting the file, disk and lock-in system (Gupta,
Agrawal and Yamaguchi 2016). This particular malware demanded ransomware of 300-600,
which is paid in around three bitcoins within three days of returning. This is mainly done for
decrypting the files of the user.
The coming pages of the report help us in highlighting the fact that this report is all about
target and working of ransomware attack. After that, damage due to attack and method of
detection of attack has been provided.
Discussion
Target
WannaCry aims to spread by using SMB (Server Message Block) protocol, that operates
in between the port 445 and 139. This is used by windows machine so that they can
communicate with file system on the provided network. With successful installation, this
particular ransomware scans for and makes propagation to some other risk devices (Bada, Sasse
and Nurse 2019). WannaCry mainly tends to assure if double pulsar has already affected the
machine or not. In April, Shadow group disclosed that double Pulsar and external Blue could
![WannaCry Ransomware Attack 2017: Target, Working, Damage, Detection_3](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fimages%2Fns%2F1ecb8434c7554d21b88e9ebc594f5369.jpg&w=3840&q=10)
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Assignment On Risk Mitigation and Security Planlg...
|14
|2958
|38
IT Security Managementlg...
|12
|2958
|324
First Cyber Attack Report 2022lg...
|8
|1508
|33
Ransomware Attacks: WannaCry and NotPetyalg...
|10
|1871
|366
Wannacry: A Cyber-Warfare in Modern Timeslg...
|11
|2953
|469
Demonstration of a Cyber Security Threat: Ransomwarelg...
|19
|815
|500