logo

WannaCry Ransomware Attack 2017: Target, Working, Damage, Detection

   

Added on  2022-12-03

10 Pages2236 Words76 Views
 | 
 | 
 | 
Running head: CYBER OPERATIONS INC
CYBER OPERATIONS INC
Name of the Student
Name of the University
Author Note:
WannaCry Ransomware Attack 2017: Target, Working, Damage, Detection_1

CYBER OPERATIONS INC1
Table of Contents
Introduction..........................................................................................................................2
Discussion............................................................................................................................2
Target...................................................................................................................................2
Working of the attack..........................................................................................................3
Damage caused by attack.....................................................................................................4
Detection of attack...............................................................................................................4
Perpetrator............................................................................................................................5
Summarize of finding..........................................................................................................6
Conclusion...........................................................................................................................6
References............................................................................................................................8
WannaCry Ransomware Attack 2017: Target, Working, Damage, Detection_2

CYBER OPERATIONS INC2
Introduction
In the year 2012, a ransomware attack affected a wide range of sectors which comprises
of government, telecommunication and lastly gas. At present, WannaCry affected around
300,000 systems that are located in 150 countries (Buczak and Guven 2015). Countries like
Russia and China are affected due to this attack as a result of usage of high percentage of
software. The overall spreading of this attack is reported in two days following the launch of the
attack. This has merely taken place as a result of discovery of ‘kill switch’ in their code. The
main motive of this attack is all about encrypting the file, disk and lock-in system (Gupta,
Agrawal and Yamaguchi 2016). This particular malware demanded ransomware of 300-600,
which is paid in around three bitcoins within three days of returning. This is mainly done for
decrypting the files of the user.
The coming pages of the report help us in highlighting the fact that this report is all about
target and working of ransomware attack. After that, damage due to attack and method of
detection of attack has been provided.
Discussion
Target
WannaCry aims to spread by using SMB (Server Message Block) protocol, that operates
in between the port 445 and 139. This is used by windows machine so that they can
communicate with file system on the provided network. With successful installation, this
particular ransomware scans for and makes propagation to some other risk devices (Bada, Sasse
and Nurse 2019). WannaCry mainly tends to assure if double pulsar has already affected the
machine or not. In April, Shadow group disclosed that double Pulsar and external Blue could
WannaCry Ransomware Attack 2017: Target, Working, Damage, Detection_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment On Risk Mitigation and Security Plan
|14
|2958
|38

IT Security Management
|12
|2958
|324

First Cyber Attack Report 2022
|8
|1508
|33

Ransomware Attacks: WannaCry and NotPetya
|10
|1871
|366

Wannacry: A Cyber-Warfare in Modern Times
|11
|2953
|469

Demonstration of a Cyber Security Threat: Ransomware
|19
|815
|500