Case Study (Literature Review)


The WannaCry attack is composed of a range of module forms. These hacking tools are flexible to set up the widely spread WannaCry ransomware, consisting of the initial attack payload, dropper, resource loader, and encryption algorithms (Hsiao and Kao, 2018). This attack encrypts all the data stored in the victim’s computer system, leaving only two files – one instructing the victim on what they should do next and another containing a decryption program for the victim to use. Hackers primarily receive the payment via Bitcoin. If not, they warn the victim that their files will be erased. In addition, by getting into the file, examining its content, and writing the encrypted contents in its place, followed by shutting down the file, ransomware replaces the content of the original file (Mohurle and Patil, 2017).

 Reference List:

Hsiao, S.C. and Kao, D.Y., 2018, February. The static analysis of WannaCry ransomware. In 2018 20th international conference on advanced communication technology (ICACT) (pp. 153-158). IEEE. Available at: The static analysis of WannaCry ransomware | IEEE Conference Publication | IEEE Xplore. [Last Accessed 28th of May 2023]

Mohurle, S. and Patil, M., 2017. A brief study of wannacry threat: Ransomware attack 2017. International Journal of Advanced Research in Computer Science8(5), pp.1938-1940. Available at: 2261f190e292ad93d6887198d7050dec.pdf (sbgsmedia.in). [Last Accessed 28th of May 2023]

Comments

Popular Posts