2018 20th International Conference on Advanced Communication Technology (ICACT) 2018
DOI: 10.23919/icact.2018.8323681
|View full text |Cite
|
Sign up to set email alerts
|

The dynamic analysis of WannaCry ransomware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 26 publications
(23 citation statements)
references
References 0 publications
0
23
0
Order By: Relevance
“…While the Dark Web was first proposed to support the freedom of the press and guarantee open discussions without political pressure [49], it is also misused for malicious purposes, such as advertising harmful content [34], [30] and command-and-control servers (C&C). For example, an e-commerce market in the Dark Web is known as one of the major drug trading sites [13], [22], and WannaCry malware, one of the most notorious ransomware, has actively used the Dark Web to operate C&C servers [50]. Cryptocurrency also presents a similar situation.…”
Section: Introductionmentioning
confidence: 99%
“…While the Dark Web was first proposed to support the freedom of the press and guarantee open discussions without political pressure [49], it is also misused for malicious purposes, such as advertising harmful content [34], [30] and command-and-control servers (C&C). For example, an e-commerce market in the Dark Web is known as one of the major drug trading sites [13], [22], and WannaCry malware, one of the most notorious ransomware, has actively used the Dark Web to operate C&C servers [50]. Cryptocurrency also presents a similar situation.…”
Section: Introductionmentioning
confidence: 99%
“…Wannacry (Mohurle and Patil (2017)) is a famous ransomware global attack that stroke in May 2017. The hackers used the EternalBlue exploit, see Kao and Hsiao (2018). The ransomware propagated via Microsoft Windows users who did not patched their system against this vulnerability.…”
Section: Calibration Of a Wannacry-type Scenariomentioning
confidence: 99%
“…After making an in-depth analysis, we confirmed that the detected domain is indeed malicious. Specifically, in [56], the authors performed a dynamic analysis of WannaCry ransomware, and showed that the domain was an indicator of compromise for WannaCry ransomware. Other security researchers such as Benkow and Matt Suiche confirmed this claim.…”
Section: F Live Streaming Analysis In a Production Environmentmentioning
confidence: 99%