Back to Search Start Over

Wannacry ransomware attack: The enemy lies under your blanket.

Authors :
Tan, Chee Chung
Selvarajah, Vinesha
Source :
AIP Conference Proceedings. 2024, Vol. 2802 Issue 1, p1-10. 10p.
Publication Year :
2024

Abstract

Ransomware has been a huge cyber threat and has gotten many organizations and individuals into trouble such as financial loss. The attacking pattern of encrypting the important data and files causes the daily operation of the organization is forced to be halted. Organization in the medical industry has been targeted badly as the cybercriminals understand the importance of medical data such as patient medical record which decides tons of humans' life. The only way to prevent from becoming the next victims is to understand the attacking pattern and method of the ransomware attack. The Internet has been a useful platform providing the public with free malware files to simulate different cyber-attacks in a virtual environment. By doing this, the public could have more understanding of various cyber threats and thus could practice the appropriate countermeasure to defend against the attacks. The purpose of this article is to demonstrate two methods of launching Wannacry ransomware attacks which include uploading ransomware files with Metasploit framework as well as serving the ransomware file via HTTP using Apache service. The tools needed for the attack are also specified. From the demonstration, both methods work well but the second method requires additional social engineering attacks such as phishing to complete the attack. The choosing of ransomware attack methods depends on a few elements such as locations, target devices, target networks, etc. The attackers use various methods or techniques to launch cyber-attacks, thus the users must always update with the latest cyber news to defend against the cyber-attacks. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
0094243X
Volume :
2802
Issue :
1
Database :
Academic Search Index
Journal :
AIP Conference Proceedings
Publication Type :
Conference
Accession number :
175035900
Full Text :
https://doi.org/10.1063/5.0181914