2017
DOI: 10.19107/ijisc.2017.01.06
|View full text |Cite
|
Sign up to set email alerts
|

Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…It is the lowest hanging fruit. Most of the attacks we see in the field right now are targeting uninformed people" (Mak, 2017) The United Kingdom National Health Service cyberattack of May 2017, which spread ransomware -WannaCryinfecting hundreds of thousands of computers across 150 countries, is the perfect example; it was executed by tricking people into clicking on a link or opening email attachments that ultimately released malware onto their computer system (Mohurle and Patil, 2017;Pascariu et al, 2017;Collier, 2017). Such human fallibility or error remains the largest factor behind security breaches, even though only 30 per cent of organizations, according to one report, viewed it as a serious concern.…”
Section: Uae Cyber Security Legislative and Regulatory Measuresmentioning
confidence: 99%
“…It is the lowest hanging fruit. Most of the attacks we see in the field right now are targeting uninformed people" (Mak, 2017) The United Kingdom National Health Service cyberattack of May 2017, which spread ransomware -WannaCryinfecting hundreds of thousands of computers across 150 countries, is the perfect example; it was executed by tricking people into clicking on a link or opening email attachments that ultimately released malware onto their computer system (Mohurle and Patil, 2017;Pascariu et al, 2017;Collier, 2017). Such human fallibility or error remains the largest factor behind security breaches, even though only 30 per cent of organizations, according to one report, viewed it as a serious concern.…”
Section: Uae Cyber Security Legislative and Regulatory Measuresmentioning
confidence: 99%
“…The relevant crypto mining files are also downloaded during this time window. This particular malware strain exploits the SMB service on port 445, just like WannaCry [32]. Interestingly, the malware blocks access to port 445 on the infected host.…”
Section: Memory Resident Crypto Miningmentioning
confidence: 99%