logo

First Cyber Attack Report 2022

   

Added on  2022-09-18

8 Pages1508 Words33 Views
 | 
 | 
 | 
Running head: CYBER ATTACK
CYBER ATTACK
Name of the Student
Name of the University
Author note
First Cyber Attack Report 2022_1

1
CYBER ATTACK
Table of Contents
Introduction......................................................................................................................................2
Cyber Attack 1.................................................................................................................................2
Cyber Attack 2.................................................................................................................................3
Cyber Attack 3.................................................................................................................................4
Summary..........................................................................................................................................5
References........................................................................................................................................6
First Cyber Attack Report 2022_2

2
CYBER ATTACK
Introduction
Cyber-attack is considered to be an attack that is launched from one or more computers
on another computer. This attack can be launched against a single network as well as on a
multiple network. The cyber breaches are diversified in 2 major sections, they are namely the
attacks in which the goals is to disable the target and the other goal is to gain access to the target
(Jhaveri and Patel 2017). The cyber attacks that will be discussed in the report are namely
WannaCry, Equifax and Yahoo attacks.
Cyber Attack 1
The very first cyber attack that have been chosen is WannCry.
WannaCry is considered to be a ransomware attack that spread in a rapid manner in the
month of May in the year 2017. The main target of the malware was to root the computers as
well as the facilities that were run by the UK NHS (Mohurle and Patil 2017).
Operational process
WannaCry targeted the computers that were running on the platform of Microsoft
Windows OS. The data that were present in the computing devices were encrypted and hence
ransom payments were demanded from the victims. WannaCry is considered as a network worm
as data was being transacted during the attack as well. The process starts WannaCry malware
initially checking the kill switch domain name (Chen and Bridges 2017). In case the kill switch
domain name is not found, the data that are present in the computing systems are encrypted.
After this process, exploiting of the SMB vulnerability is done (Mattei 2017). This is done for
spreading out to different computing devices that are present in the same network.
First Cyber Attack Report 2022_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
WannaCry Ransomware Attack 2017: Target, Working, Damage, Detection
|10
|2236
|76

Cyber Crime: WannaCry Attack on NHS
|10
|2252
|2

Understanding Ransomware Attack and Fence Register in Operating System
|16
|3404
|318

Ransomware Malware: A Walkthrough and Real World Example
|5
|1180
|59

IT Security Management
|12
|2958
|324

Demonstration of a Cyber Security Threat: Ransomware
|19
|815
|500