Re: WannaCry ransomware stopped by domain kill switch
Posted: Sun May 14, 2017 8:18 pm
by Royal
I remember one case study regarding the spread of a harmless virus.
They thought it was started by the Gov or Microsoft since it was distributed on a Friday and would have low business impact. As opposed to a Monday or Tuesday when all systems are up.
Is Friday better when IT resources may be low?
Re: WannaCry ransomware stopped by domain kill switch
Posted: Sun May 14, 2017 8:28 pm
by Pigeon
It's be re-released, sans kill switch domain feature.
The oops that is not longer.
Re: WannaCry ransomware stopped by domain kill switch
Posted: Sun May 14, 2017 8:31 pm
by Royal
Friday could of been the EP of a coming album.
What else was in that NSA toolkit?
Re: WannaCry ransomware stopped by domain kill switch
Posted: Sun May 14, 2017 8:38 pm
by Royal
Russia suspected of releasing toolkit.
Russia as one of the hardest hit by the ransomware attack.
Are the shots being fired?
Re: WannaCry ransomware stopped by domain kill switch
Posted: Mon May 15, 2017 2:50 pm
by Pigeon
Nice RansomWare v0.9
NSA Open Malware License
I would like to hold you computer hostage for a ransom
OK (y/n)>y
Your data files will be encrypted
OK (y/n)>y
You will remit in ransomcoin
OK (y/n)>y
No attempt to find me will be made
OK (y/n)>y
Ready to proceed
OK (y/n)>n
Are you sure
OK (y/n)>y
derp
Re: WannaCry ransomware stopped by domain kill switch