Page 3 of 3

Re: WannaCry ransomware stopped by domain kill switch

Posted: Sun May 14, 2017 8:18 pm
by Royal
I remember one case study regarding the spread of a harmless virus.

They thought it was started by the Gov or Microsoft since it was distributed on a Friday and would have low business impact. As opposed to a Monday or Tuesday when all systems are up.

Is Friday better when IT resources may be low?

Re: WannaCry ransomware stopped by domain kill switch

Posted: Sun May 14, 2017 8:28 pm
by Pigeon
It's be re-released, sans kill switch domain feature.

The oops that is not longer.

Re: WannaCry ransomware stopped by domain kill switch

Posted: Sun May 14, 2017 8:31 pm
by Royal
Friday could of been the EP of a coming album.


What else was in that NSA toolkit?

Re: WannaCry ransomware stopped by domain kill switch

Posted: Sun May 14, 2017 8:38 pm
by Royal
Russia suspected of releasing toolkit.

Russia as one of the hardest hit by the ransomware attack.


Are the shots being fired?

Re: WannaCry ransomware stopped by domain kill switch

Posted: Mon May 15, 2017 2:50 pm
by Pigeon
Nice RansomWare v0.9
NSA Open Malware License

I would like to hold you computer hostage for a ransom
OK (y/n)>y

Your data files will be encrypted
OK (y/n)>y

You will remit in ransomcoin
OK (y/n)>y

No attempt to find me will be made
OK (y/n)>y

Ready to proceed
OK (y/n)>n

Are you sure
OK (y/n)>y

derp

Re: WannaCry ransomware stopped by domain kill switch

Posted: Fri May 19, 2017 4:12 pm
by Royal