Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2022-05-12 16:45:59 |
Ransomware cyber-attacks in Costa Rica and Peru drives national response (lien direct) |
>Highlights Effectively, one out of every 60 organizations globally have been impacted by attempted ransomware attacks every week, so far in in the first four months of 2022 A 14% increase of attempted ransomware attacks to organizations globally every week compared to the same period last year. To mark the 5th anniversary of the WannaCry…
|
Ransomware
|
Wannacry
|
|
|
2022-05-12 00:37:30 |
How the evolution of ransomware has changed the threat landscape (lien direct) |
>From WannaCry to Conti: A 5-Year Perspective Five years ago, on May 12, 2017, the world fell victim to a major ransomware attack known as 'WannaCry'. The attack had an unprecedented scale, and spread around the world like wildfire, with more than 200,000 Windows computers across 150 countries affected outbreaking only a few days.…
|
Ransomware
Threat
|
Wannacry
Wannacry
|
|
|
2019-06-13 13:00:03 |
May 2019\'s Most Wanted Malware: Patch Now to Avoid the BlueKeep Blues (lien direct) |
In May, the most significant event in the threat landscape was not a new type of malware: it was a serious vulnerability in older versions of Windows operating systems that – if exploited by criminals – could lead to the type of mega-scale ransomware attacks we saw in 2017 with WannaCry and NotPetya. The…
|
Ransomware
Vulnerability
Threat
Guideline
|
NotPetya
Wannacry
|
★★★
|
|
2018-10-15 06:41:01 |
Godzilla Loader and the Long Tail of Malware (lien direct) |
Research by: Ben Herzog To most victims, malware is a force of nature. Zeus, Wannacry, Conficker are all vengeful gods, out to punish the common man for clicking the wrong link. Even for a security analyst, it’s easy to fall into the kind of thin...
|
Malware
|
Wannacry
|
|
|
2018-08-16 09:45:01 |
Quickly Gauge Your Security\'s Generation With This 5-Question Quiz (lien direct) |
by Bob Matlow, Cyber Security Advocate The cyber-security world entered a new day and age when WannaCry and NotPetya wrecked havoc across hundreds of countries, causing billions of dollars of damage. Cyber criminals have adapted to this new reality by launching multi-vector, polymorphic, globally-scaled attacks – but IT professionals are lagging behind. Only 3 percent…
|
|
NotPetya
Wannacry
|
|
|
2018-06-12 19:53:01 |
Deep Dive into UPAS Kit vs. Kronos (lien direct) |
By Mark Lechtik Introduction In this post we will be analyzing the UPAS Kit and the Kronos banking Trojan, two malwares that have come under the spotlight recently due to the back story behind them. Background In May 2017, WannaCry wreaked havoc in ove...
|
|
Wannacry
|
|
|
2018-06-05 13:00:02 |
Healthcare, Retail, and Finance: Gen V Attacks Affect All Industries (lien direct) |
Fifth generation mega-attacks have changed the cyber security landscape forever. As proven by the WannaCry and Petya ransomware attacks last year, using vulnerabilities and exploit tools stolen from intelligence agencies, attackers can now cause economic chaos across all industries around the world. From finance to healthcare to manufacturing, almost all organizations across all industries […]
|
|
Wannacry
|
|
|
2018-05-15 13:00:04 |
One Year Later: WannaCry, The Dawn Of A New Generation Of Cyber-Attacks (lien direct) |
A year ago today, after multiple days of digital bombardment, the cyber-security world changed forever. Over one weekend, the notorious ransomware attack that would become widely known as WannaCry infected more than 200,000 machines around the world, causing billions of dollars in damages. Ransomware attacks occur all the time, but the speed and the […]
|
|
Wannacry
|
|
|
2017-12-13 14:00:31 |
What Lies Ahead? Cyber-Security Predictions for 2018 (lien direct) |
>Arnold H. Glasow famously quipped that “the trouble with the future is that it usually arrives before we're ready for it.† The past year certainly took us by surprise when the WannaCry and Petya ransomware outbreaks hit businesses globally, causing unprecedented disruption, while serious new vulnerabilities such as BlueBorne were discovered in almost every connected […]
|
|
Wannacry
|
|
|
2017-08-30 13:00:55 |
Layered protection is a must. Here\'s why. (lien direct) |
Cyber attacks are advancing in their sophistication. Take WannaCry – once it makes a single entry, its ability to spread throughout the organization and evade protection layers infected hundreds of thousands of computers. These advances make it clear that there's no singular point solution that can act as a “magic bulletâ€. Companies have been approaching […]
|
|
Wannacry
|
|
|
2017-08-11 23:52:38 |
“The Next WannaCry†Vulnerability is Here – Let\'s Stop it before it\'s too Late (lien direct) |
This Tuesday, Microsoft released a security patch including 48 fixes, 25 of which are defined as “criticalâ€. While Microsoft updates happen every month, this one reveals an especially dangerous vulnerability – CVE-2017-8620. Behind this dull name hides a severe flaw affecting all current versions of Windows, which enables attackers to spread a contagious attack between […]
|
|
Wannacry
|
|
|
2017-07-31 23:02:15 |
Are You Prepared for the Next Attack? (lien direct) |
A WAKE-UP CALL From WannaCry and Petya to the most recent attacks today, #LeakTheAnalyst and HBO-it is now apparent that anyone or any organization is a target for cyber criminals. Attacks continue to grow at an alarming rate – in volume, sophistication and impact. As of May 2017, Check Point products are detecting over 17 million […]
|
|
Wannacry
|
|
|
2017-07-12 15:00:46 |
Check Point: A Leader in Vision and Execution (lien direct) |
Following the latest cyber attack outbreaks, WannaCry and Petya ransomware, businesses are now realizing just how vulnerable they are.  What seemed to be “good enough solutions†until now simply isn't enough in today's world. But still, many continue to add solutions that are focused on detecting attacks rather than preventing them. This approach lets the […]
|
|
Wannacry
|
|
|
2017-07-04 00:58:04 |
BROKERS IN THE SHADOWS – Part 2: Analyzing Petya\'s DoublePulsarV2.0 Backdoor (lien direct) |
Background In the wake of WannaCry, a new cyber threat has emerged from the NSA leak. Making use of previously exposed tools, Petya once again is engaged in another large scale attack. Important distinctions in this case, however, are that the attacks targets specific victims, and are used solely for destruction. While Petya may look […]
|
|
Wannacry
|
|
|
2017-06-28 15:02:08 |
Preventing Petya – stopping the next ransomware attack (lien direct) |
Check Point's Incident Response Team has been responding to multiple global infections caused by a new variant of the Petya malware, which first appeared in 2016 and is currently moving laterally within customer networks. It appears to be using the 'EternalBlue' exploit which May's WannaCry attack also exploited. It was first signaled by attacks on […]
|
|
Wannacry
|
|
|
2017-06-20 13:00:09 |
May\'s Most Wanted Malware: Fireball and Wannacry Impact More Than 1 in 4 Organizations Globally (lien direct) |
Check Point's latest Global Threat Impact Index revealed more than one in four organizations globally was affected by the Fireball or Wannacry attacks during May– in the company's latest Global Threat Impact Index. The top three malware families that impacted networks globally were zero-day, previously unseen attacks. Fireball impacted one in five organizations worldwide, […]
|
|
Wannacry
|
|
|
2017-05-17 13:00:11 |
Check Point Reveals Global WannaCry Ransomware Infection Map at CPX Europe 2017 (lien direct) |
Check Point researchers have been investigating the ransomware campaign in detail since it was first reported. With a new Check Point WannaCry Ransomware Infection Map, the researchers were able to track 34,300 attack attempts in 97 countries. The average pace as of today is one attempt in every three second – indicating a slight decline […]
|
|
Wannacry
|
|
|
2017-05-16 16:48:44 |
CRYING IS FUTILE: SandBlast Forensic Analysis of WannaCry (lien direct) |
Using the NSA exploit EternalBlue released by the Shadow Brokers, the WannaCry ransomware developers have added their names to malware lore. Given the number of institutions hit and the amount of media generated, it seemed appropriate to show what the ransomware actually does on a system through our SandBlast Agent Forensics product. The WannaCry outbreak […]
|
|
Wannacry
|
|
|
2017-05-15 19:00:14 |
WannaCry – New Kill-Switch, New Sinkhole (lien direct) |
Check Point Threat Intelligence and Research team has just registered a brand new kill-switch domain used by a fresh sample of the WannaCry Ransomware. In the last few hours we witnessed a stunning hit rate of 1 connection per second. Registering the domain activated the kill-switch, and these thousands of to-be victims are safe from […]
|
|
Wannacry
|
|
|
2017-05-14 18:29:09 |
WannaCry – Paid Time Off? (lien direct) |
Let us open with a TL;DR – DO NOT pay the ransom demanded by the WannaCry ransomware! Now, let us explain why: As of this writing , the 3 bitcoin accounts associated with the WannaCry ransomware have accumulated more than $33,000Â between them. Despite that, not a single case has been reported of anyone receiving their […]
|
|
Wannacry
|
|
|
2017-05-12 19:08:39 |
Global Outbreak of WannaCry (lien direct) |
[Updated May 15, 2017] On May 12, 2017 the Check Point Incident Response Team started tracking a wide spread outbreak of the WannaCryp ransomware. We have reports that multiple global organizations are experiencing a large scale ransomware attack which is utilizing SMB to propagate within their networks. To complicate matters there are a number of […]
|
|
Wannacry
|
|