SlideShare a Scribd company logo
Wannacry Virus: Alarming News for the World
Introduction:
Ransomware, recently a common name heard in the
world cyber news. The WANNACRY
RANSOMWARE ATTACK has quickly become
the worst digital disaster to strike the internet in
years, crippling transportation and hospitals globally
[1]. The ransomware virus name is ‘WANNACRY’.
There are reports of infections in 99 countries,
including Russia and China. Among the worst hit was
the National Health Service (NHS) in England and
Scotland. This is one of the recent cyber-attack that
affects the world greatly. The expert says it is a
warning call for the world [2].
What is wannacry?
Wannacry is kind of ramsomware. Where the virus
attacks the system and block it functional activity.
The virus attacks the world in Friday. It mainly
attacks the windows based system. There are many
kind of the virus like WannaCrypt. The virus mainly
attacks the system and locks the file the user wants to
access. Then it requires a password to access the file
data. The hacker group demand ransome for the
password. Usually the demand is fulfilled by Bitcoin.
Bitcoin is mainly an online based currency. It is
mainly a digital currency of payment without giving
any fee. Some company encourages the bitcoin
system by giving interest over transaction. The virus
not only attacks the user pc but also it attacks the
mobile phone, tab, and laptop also. Ransome is kind
cyber-attack where the hacker took control over the
pc and demand money from the user.
Impact of wannacry:
The wannacry ransomware forced the hospital to turn
away their patient in UK. It also attacks more than
200,000 organisations in 150 countries across the
world. In the UK, the major assault hit 47 NHS trusts,
leading to operations being cancelled and patients
turned away from A&E[3]. Systems at British
Hospitals, Germany’s national railway, Spain’s
biggest phone company and even Fed Ex in the
United States have been victimized by the virus that
demands corporations and individuals pay a ransom
to regain files that have been encrypted by the
attacker .
How did the cyber-attack found out?
The virus was first notice on Friday. Then it quickly
spread the world. In UK the computer system in
medical goes down one by one. The NHS staff notice
a screenshot of demanding 300$ in bitcoin for access
in each computer and the staff cannot access the files
data. Immediately after that several incidents were
reported throughout the Europe. In Russia a bank,
railway system, mobile network systems were
affected. The interior ministry in Russia said that
1000 of their computers were affected but no
sensitive data were reported stolen. In Spain a major
mobile network system and natural gas distributor
computer system were attacked. In US Delivery
Company FedEx is attacked.
How does it attack the system?
This virus is hidden within document file, PDF and
other type of file system. First of all it attacks via
opening unsecure link. By opening an affected
document it attacks the user system. When the
affected user sent email to another user thus the virus
spread and it also open a backdoor in the system for
further attack. It also takes control over user system
and show massage to give ransom for the access over
the system. It mainly attacks older version windows
operating system and some newer ones also. The
virus attack those system which software in not
updated or who uses unsecured software. The
company or organization uses this kind of system or
software is at risk being attacked by ransomware. The
creators of wannacry are still unknown. The
government and their security are failed to locate the
responsible group for the attack. But the security
expert confirmed that whoever responsible for this
attacks it’s their second attempt. The previous
version of wannacry is WeCry. It asked the user for
177$ worth bitcoin to access in their system in that
time. In the past a user can take control over the
system by giving 300$ bitcoin. But there is no
guarantee that this time it will happen also.
How to prevent yourself from attacking:
 The hackers mainly attack the system by
exploiting the flaws in windows operating
system. WannaCry leverages CVE-2017-
0144, a vulnerability in Server Message
Block, to infect systems. The security flaw
is attacked using an exploit leaked by the
Shadow Brokers group—the “EternalBlue”
exploit, in particular. Microsoft’s Security
Response Center (MSRC)
Team addressed the vulnerability via MS17-
010 released March, 2017[4]. Microsoft
assume about this kind of threat so they
update a patch file a month ago. So to
prevent the system from attacking your
operating system must be up to date.
 The best protection for this kind of attack is
to maintain a backup for your file. So if the
system is attacked you can run your system
from the backup.
 You must use latest antivirus and anti-
malware tools for prevention and scan your
system daily basis for protection in your
computer and mobile phone.
 The most common way of spreading virus
is visiting affected websites and opening
contained email. It also spread by displaying
malicious advertise and downloading bad
program or application. So the user must
prevent him from doing this.
 Another way of preventing is that scans a
file before downloading and block secret
installation and check for malware in your
system.
 Do not use unauthorized device and network
for login into your account. Do not use any
kind of password reminder tools and also
use long and hard password for your system.
Use ad blocker for preventing any pop up
advertises.
 Do not give your credit and financial
information to any unrecognized websites.
 Update Windows firewall system and
detection.
Conclusion:
Finally some good news, while working on the virus
MalwareTech that the programmer who build
Ransomware cheak a certain website every time. The
expert become curious about it and checks the
domain of the website. MalwareTech programmers
find out that the domain is unallocated to they spend
10.69$ to buy the domain and shut the URL. As it
turns out that as long as the domain is sealed the
spread of wannacry is blocked. The expert named this
as a kill switch for the spreading of the virus. But the
system who are already affected by the virus is
doesn’t do any good for them.
Reference:
[1] " Cite a Website - Cite This For Me". Wired.com. N.p., 2017. Web, 18 May 2017.
[2] "Massive Ransomware Infection Hits Computers in 99 Countries - BBC News". BBC News. N.p.,
2017. Web. 18 May 2017.
[3] McGoogan, Cara, James Titcomb, and Charlotte Krol. "What Is Wannacry and How Does
Ransomware Work?". The Telegraph. N.p., 2017. Web. 18 May 2017.
[4] "Wannacry Ransomware Attack". En.wikipedia.org. N.p., 2017. Web. 18 May 2017.
Wannacry Virus

More Related Content

PPT
Wanna cry
Aditya Pal
 
PDF
Escan advisory wannacry ransomware
MicroWorld Software Services Pvt Ltd
 
PDF
How to prevent WannaCry Ransomware
Seminar Links
 
PPT
Protecting Your organization from WannaCry Ransomware
Quick Heal Technologies Ltd.
 
PPTX
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
MavrickHost - Reliable Hosting Partner
 
PPT
Wannacry
Gunther Clauwaert
 
PPTX
WannaCry ransomware attack
Abdelhakim Salama
 
DOC
WannaCry: Autopsy of Ransomwar
David Smith
 
Wanna cry
Aditya Pal
 
Escan advisory wannacry ransomware
MicroWorld Software Services Pvt Ltd
 
How to prevent WannaCry Ransomware
Seminar Links
 
Protecting Your organization from WannaCry Ransomware
Quick Heal Technologies Ltd.
 
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
MavrickHost - Reliable Hosting Partner
 
WannaCry ransomware attack
Abdelhakim Salama
 
WannaCry: Autopsy of Ransomwar
David Smith
 

What's hot (19)

PDF
Ransomware Trends 2017 & Mitigation Techniques
Avinash Sinha
 
PDF
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
Vijay Sarathy Rangayyan
 
DOCX
Cyber Risk
Susana Gallardo
 
PPTX
Ransomware 2017: New threats emerge
Symantec Security Response
 
PPTX
seminar report on What is ransomware
Jawhar Ali
 
PPTX
Ransomware
DevAkabari
 
PDF
Jean pier talbot - web is the battlefield - atlseccon2011
Atlantic Security Conference
 
PDF
Flashpoint ransomware april2016
Andrey Apuhtin
 
PPTX
WannaCry Ransomware
Zoho Corporation
 
PPTX
Ransomware attack
Amna
 
PPTX
WannaCry / Wannacrypt Ransomware
Ayoub R.
 
DOCX
External threats to information system: Malicious software and computer crimes
Souman Guha
 
PDF
How to tackle the Ransomware threat "WannaCry" | Sysfore
Sysfore Technologies
 
PDF
HCA 530, Week2, Psa i-091516-ransomware notice from fbi
Matthew J McMahon
 
PDF
Wanna cry ransomware cyber security awareness
Kamlesh Soni (MCA,ITIL,PCI DSS)
 
PDF
Scaling Web 2.0 Malware Infection
Wayne Huang
 
PPTX
MALWARE AND ITS TYPES
daniyalqureshi712
 
PPTX
Types of malware threats
EC-Council
 
Ransomware Trends 2017 & Mitigation Techniques
Avinash Sinha
 
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
Vijay Sarathy Rangayyan
 
Cyber Risk
Susana Gallardo
 
Ransomware 2017: New threats emerge
Symantec Security Response
 
seminar report on What is ransomware
Jawhar Ali
 
Ransomware
DevAkabari
 
Jean pier talbot - web is the battlefield - atlseccon2011
Atlantic Security Conference
 
Flashpoint ransomware april2016
Andrey Apuhtin
 
WannaCry Ransomware
Zoho Corporation
 
Ransomware attack
Amna
 
WannaCry / Wannacrypt Ransomware
Ayoub R.
 
External threats to information system: Malicious software and computer crimes
Souman Guha
 
How to tackle the Ransomware threat "WannaCry" | Sysfore
Sysfore Technologies
 
HCA 530, Week2, Psa i-091516-ransomware notice from fbi
Matthew J McMahon
 
Wanna cry ransomware cyber security awareness
Kamlesh Soni (MCA,ITIL,PCI DSS)
 
Scaling Web 2.0 Malware Infection
Wayne Huang
 
MALWARE AND ITS TYPES
daniyalqureshi712
 
Types of malware threats
EC-Council
 
Ad

Similar to Wannacry Virus (20)

PPT
WannaCryppthisiiskhsisksksksjgshsksksk.ppt
HasanNudin31
 
PPT
WannaCrygehieiwkwjwhwhwiwiwjwhhwjwjhw.ppt
HasanNudin31
 
PDF
Ransomware (1).pdf
HiYeti1
 
PPTX
Ransomware and email security ver - 1.3
Denise Bailey
 
PPTX
SECURITY IN COMPUTING.pptx
SHASHANKMISHRA737081
 
PPTX
Ransomware
Chaitali Sharma
 
PPTX
Malware
Anoushka Srivastava
 
PPTX
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...
Black Duck by Synopsys
 
PDF
File000145
Desmond Devendran
 
PPTX
Computer viruses
Dark Side
 
PPTX
Defend Your Company Against Ransomware
Kevo Meehan
 
PPTX
HR's Critical Role in Protecting Company Data
Parsons Behle & Latimer
 
PDF
Cyber Malware Programs And The Internet
Heidi Maestas
 
PDF
Malware Infections
Jessica Howard
 
PPTX
Ransomware- A reality check (Part 1).pptx
Infosectrain3
 
PDF
The Complete Guide to Ransomware Protection for SMBs
Protected Harbor
 
PDF
Case Study: Wannacry Ransomware attacks Telefónica
Sergio Renteria Nuñez
 
PPTX
Industry reactions to wanna cry ransomware attacks
kevinmass30
 
PPTX
What is ransomware
vikash saini
 
PPTX
MMW April 2016 Ransomware Resurgence
Cyphort
 
WannaCryppthisiiskhsisksksksjgshsksksk.ppt
HasanNudin31
 
WannaCrygehieiwkwjwhwhwiwiwjwhhwjwjhw.ppt
HasanNudin31
 
Ransomware (1).pdf
HiYeti1
 
Ransomware and email security ver - 1.3
Denise Bailey
 
SECURITY IN COMPUTING.pptx
SHASHANKMISHRA737081
 
Ransomware
Chaitali Sharma
 
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...
Black Duck by Synopsys
 
File000145
Desmond Devendran
 
Computer viruses
Dark Side
 
Defend Your Company Against Ransomware
Kevo Meehan
 
HR's Critical Role in Protecting Company Data
Parsons Behle & Latimer
 
Cyber Malware Programs And The Internet
Heidi Maestas
 
Malware Infections
Jessica Howard
 
Ransomware- A reality check (Part 1).pptx
Infosectrain3
 
The Complete Guide to Ransomware Protection for SMBs
Protected Harbor
 
Case Study: Wannacry Ransomware attacks Telefónica
Sergio Renteria Nuñez
 
Industry reactions to wanna cry ransomware attacks
kevinmass30
 
What is ransomware
vikash saini
 
MMW April 2016 Ransomware Resurgence
Cyphort
 
Ad

More from East West University (6)

PPTX
An approach to enhancing image contrast using genetic algorithm
East West University
 
PPTX
Comparative Analysis of Distance Vector Routing & Link State Protocols
East West University
 
PDF
Simulation of food serving system of EWU canteen using Arena software
East West University
 
PDF
Right to be Forgotten
East West University
 
PDF
Software piracy in Bangladesh
East West University
 
PPTX
Digital Search Tree
East West University
 
An approach to enhancing image contrast using genetic algorithm
East West University
 
Comparative Analysis of Distance Vector Routing & Link State Protocols
East West University
 
Simulation of food serving system of EWU canteen using Arena software
East West University
 
Right to be Forgotten
East West University
 
Software piracy in Bangladesh
East West University
 
Digital Search Tree
East West University
 

Recently uploaded (20)

PPT
Activate_Methodology_Summary presentatio
annapureddyn
 
PDF
New Download MiniTool Partition Wizard Crack Latest Version 2025
imang66g
 
PDF
MiniTool Power Data Recovery Crack New Pre Activated Version Latest 2025
imang66g
 
PPTX
oapresentation.pptx
mehatdhavalrajubhai
 
DOCX
Can You Build Dashboards Using Open Source Visualization Tool.docx
Varsha Nayak
 
PDF
New Download FL Studio Crack Full Version [Latest 2025]
imang66g
 
PDF
Exploring AI Agents in Process Industries
amoreira6
 
PPTX
Presentation about Database and Database Administrator
abhishekchauhan86963
 
PPTX
Maximizing Revenue with Marketo Measure: A Deep Dive into Multi-Touch Attribu...
bbedford2
 
PDF
Teaching Reproducibility and Embracing Variability: From Floating-Point Exper...
University of Rennes, INSA Rennes, Inria/IRISA, CNRS
 
PDF
Key Features to Look for in Arizona App Development Services
Net-Craft.com
 
PPTX
Explanation about Structures in C language.pptx
Veeral Rathod
 
PDF
What to consider before purchasing Microsoft 365 Business Premium_PDF.pdf
Q-Advise
 
PPT
Why Reliable Server Maintenance Service in New York is Crucial for Your Business
Sam Vohra
 
PPTX
ConcordeApp: Engineering Global Impact & Unlocking Billions in Event ROI with AI
chastechaste14
 
PPTX
GALILEO CRS SYSTEM | GALILEO TRAVEL SOFTWARE
philipnathen82
 
PPTX
Presentation about variables and constant.pptx
safalsingh810
 
PDF
ShowUs: Pharo Stream Deck (ESUG 2025, Gdansk)
ESUG
 
PPTX
ASSIGNMENT_1[1][1][1][1][1] (1) variables.pptx
kr2589474
 
PPTX
Contractor Management Platform and Software Solution for Compliance
SHEQ Network Limited
 
Activate_Methodology_Summary presentatio
annapureddyn
 
New Download MiniTool Partition Wizard Crack Latest Version 2025
imang66g
 
MiniTool Power Data Recovery Crack New Pre Activated Version Latest 2025
imang66g
 
oapresentation.pptx
mehatdhavalrajubhai
 
Can You Build Dashboards Using Open Source Visualization Tool.docx
Varsha Nayak
 
New Download FL Studio Crack Full Version [Latest 2025]
imang66g
 
Exploring AI Agents in Process Industries
amoreira6
 
Presentation about Database and Database Administrator
abhishekchauhan86963
 
Maximizing Revenue with Marketo Measure: A Deep Dive into Multi-Touch Attribu...
bbedford2
 
Teaching Reproducibility and Embracing Variability: From Floating-Point Exper...
University of Rennes, INSA Rennes, Inria/IRISA, CNRS
 
Key Features to Look for in Arizona App Development Services
Net-Craft.com
 
Explanation about Structures in C language.pptx
Veeral Rathod
 
What to consider before purchasing Microsoft 365 Business Premium_PDF.pdf
Q-Advise
 
Why Reliable Server Maintenance Service in New York is Crucial for Your Business
Sam Vohra
 
ConcordeApp: Engineering Global Impact & Unlocking Billions in Event ROI with AI
chastechaste14
 
GALILEO CRS SYSTEM | GALILEO TRAVEL SOFTWARE
philipnathen82
 
Presentation about variables and constant.pptx
safalsingh810
 
ShowUs: Pharo Stream Deck (ESUG 2025, Gdansk)
ESUG
 
ASSIGNMENT_1[1][1][1][1][1] (1) variables.pptx
kr2589474
 
Contractor Management Platform and Software Solution for Compliance
SHEQ Network Limited
 

Wannacry Virus

  • 1. Wannacry Virus: Alarming News for the World Introduction: Ransomware, recently a common name heard in the world cyber news. The WANNACRY RANSOMWARE ATTACK has quickly become the worst digital disaster to strike the internet in years, crippling transportation and hospitals globally [1]. The ransomware virus name is ‘WANNACRY’. There are reports of infections in 99 countries, including Russia and China. Among the worst hit was the National Health Service (NHS) in England and Scotland. This is one of the recent cyber-attack that affects the world greatly. The expert says it is a warning call for the world [2]. What is wannacry? Wannacry is kind of ramsomware. Where the virus attacks the system and block it functional activity. The virus attacks the world in Friday. It mainly attacks the windows based system. There are many kind of the virus like WannaCrypt. The virus mainly attacks the system and locks the file the user wants to access. Then it requires a password to access the file data. The hacker group demand ransome for the password. Usually the demand is fulfilled by Bitcoin. Bitcoin is mainly an online based currency. It is mainly a digital currency of payment without giving any fee. Some company encourages the bitcoin system by giving interest over transaction. The virus not only attacks the user pc but also it attacks the mobile phone, tab, and laptop also. Ransome is kind cyber-attack where the hacker took control over the pc and demand money from the user. Impact of wannacry: The wannacry ransomware forced the hospital to turn away their patient in UK. It also attacks more than 200,000 organisations in 150 countries across the world. In the UK, the major assault hit 47 NHS trusts, leading to operations being cancelled and patients turned away from A&E[3]. Systems at British Hospitals, Germany’s national railway, Spain’s biggest phone company and even Fed Ex in the United States have been victimized by the virus that demands corporations and individuals pay a ransom to regain files that have been encrypted by the attacker . How did the cyber-attack found out? The virus was first notice on Friday. Then it quickly spread the world. In UK the computer system in medical goes down one by one. The NHS staff notice a screenshot of demanding 300$ in bitcoin for access in each computer and the staff cannot access the files data. Immediately after that several incidents were reported throughout the Europe. In Russia a bank, railway system, mobile network systems were affected. The interior ministry in Russia said that 1000 of their computers were affected but no sensitive data were reported stolen. In Spain a major mobile network system and natural gas distributor computer system were attacked. In US Delivery Company FedEx is attacked. How does it attack the system? This virus is hidden within document file, PDF and other type of file system. First of all it attacks via opening unsecure link. By opening an affected document it attacks the user system. When the affected user sent email to another user thus the virus spread and it also open a backdoor in the system for further attack. It also takes control over user system and show massage to give ransom for the access over the system. It mainly attacks older version windows operating system and some newer ones also. The virus attack those system which software in not updated or who uses unsecured software. The company or organization uses this kind of system or software is at risk being attacked by ransomware. The creators of wannacry are still unknown. The government and their security are failed to locate the responsible group for the attack. But the security expert confirmed that whoever responsible for this attacks it’s their second attempt. The previous version of wannacry is WeCry. It asked the user for 177$ worth bitcoin to access in their system in that time. In the past a user can take control over the system by giving 300$ bitcoin. But there is no guarantee that this time it will happen also.
  • 2. How to prevent yourself from attacking:  The hackers mainly attack the system by exploiting the flaws in windows operating system. WannaCry leverages CVE-2017- 0144, a vulnerability in Server Message Block, to infect systems. The security flaw is attacked using an exploit leaked by the Shadow Brokers group—the “EternalBlue” exploit, in particular. Microsoft’s Security Response Center (MSRC) Team addressed the vulnerability via MS17- 010 released March, 2017[4]. Microsoft assume about this kind of threat so they update a patch file a month ago. So to prevent the system from attacking your operating system must be up to date.  The best protection for this kind of attack is to maintain a backup for your file. So if the system is attacked you can run your system from the backup.  You must use latest antivirus and anti- malware tools for prevention and scan your system daily basis for protection in your computer and mobile phone.  The most common way of spreading virus is visiting affected websites and opening contained email. It also spread by displaying malicious advertise and downloading bad program or application. So the user must prevent him from doing this.  Another way of preventing is that scans a file before downloading and block secret installation and check for malware in your system.  Do not use unauthorized device and network for login into your account. Do not use any kind of password reminder tools and also use long and hard password for your system. Use ad blocker for preventing any pop up advertises.  Do not give your credit and financial information to any unrecognized websites.  Update Windows firewall system and detection. Conclusion: Finally some good news, while working on the virus MalwareTech that the programmer who build Ransomware cheak a certain website every time. The expert become curious about it and checks the domain of the website. MalwareTech programmers find out that the domain is unallocated to they spend 10.69$ to buy the domain and shut the URL. As it turns out that as long as the domain is sealed the spread of wannacry is blocked. The expert named this as a kill switch for the spreading of the virus. But the system who are already affected by the virus is doesn’t do any good for them. Reference: [1] " Cite a Website - Cite This For Me". Wired.com. N.p., 2017. Web, 18 May 2017. [2] "Massive Ransomware Infection Hits Computers in 99 Countries - BBC News". BBC News. N.p., 2017. Web. 18 May 2017. [3] McGoogan, Cara, James Titcomb, and Charlotte Krol. "What Is Wannacry and How Does Ransomware Work?". The Telegraph. N.p., 2017. Web. 18 May 2017. [4] "Wannacry Ransomware Attack". En.wikipedia.org. N.p., 2017. Web. 18 May 2017.