Posts Tagged ‘WANNACRY’

Most Recent
 
Read More
2019-02-21

Will WannaCry be back?

There was a rapid growth of encryption programs in 2017. The most striking attacks were WannaCry, exPetr and BadRabbit. The attacks were aimed at businesses, and cyber security experts are looking for a way to stop the spread of the virus. Experts say that WannaCry has not been destroyed yet.

59
 
Read More
2018-08-21

Popular Cryptocurrency Miners

Bitcoin is the most famous cryptocurrency, and the oldest one. Previously, it could be mined using a home computer. It was even possible to use your laptop. Then the situation shifted to the use of GPUs as the complexity of cryptocurrency mining increased. At present, you need specialized intelligent equipment.

58
 
Read More
2017-07-24

WannaCry may be ported for Windows 10

Rene Milman wrote an article about how the latest Microsoft operating system could be infected with ransomware. Malicious can on TCP scan 445 port (Server Message Block / SMB) and spread like a worm, attacking hosts and encrypting the files that are on them. After that, he wants to list some number of bitcoyans for decryption.

 

46
 
Read More
2017-06-23

WANNACRY ON INDUSTRIAL NETWORKS

In mid-May 2017, many companies around the world were attacked by the WannaCry network crypto variant. The Wannacle malware spread across local networks and the Internet by exploiting the CVE-2017-0143 (MS17-010) vulnerability in components of the SMBv1 service (port TCP 445) in Windows operating systems. Since the industrial network is not directly connected to the Internet, and access is provided through the corporate network using NAT, a firewall and a corporate proxy server, which makes it impossible to infect such systems via the Internet. There are typical industrial network configuration errors, which have led to WannaCry infections, according to our data:

 

67
Latest Headlines
 
Read More
170
 
Read More
111
 
Read More
349

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
digital forensics software
Android forensics
windows forensics
incident response
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Chip-off Technique in Mobile Forensics