Loading…

Wannacry ransomware attack: The enemy lies under your blanket

Ransomware has been a huge cyber threat and has gotten many organizations and individuals into trouble such as financial loss. The attacking pattern of encrypting the important data and files causes the daily operation of the organization is forced to be halted. Organization in the medical industry...

Full description

Saved in:
Bibliographic Details
Main Authors: Tan, Chee Chung, Selvarajah, Vinesha
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Ransomware has been a huge cyber threat and has gotten many organizations and individuals into trouble such as financial loss. The attacking pattern of encrypting the important data and files causes the daily operation of the organization is forced to be halted. Organization in the medical industry has been targeted badly as the cybercriminals understand the importance of medical data such as patient medical record which decides tons of humans’ life. The only way to prevent from becoming the next victims is to understand the attacking pattern and method of the ransomware attack. The Internet has been a useful platform providing the public with free malware files to simulate different cyber-attacks in a virtual environment. By doing this, the public could have more understanding of various cyber threats and thus could practice the appropriate countermeasure to defend against the attacks. The purpose of this article is to demonstrate two methods of launching Wannacry ransomware attacks which include uploading ransomware files with Metasploit framework as well as serving the ransomware file via HTTP using Apache service. The tools needed for the attack are also specified. From the demonstration, both methods work well but the second method requires additional social engineering attacks such as phishing to complete the attack. The choosing of ransomware attack methods depends on a few elements such as locations, target devices, target networks, etc. The attackers use various methods or techniques to launch cyber-attacks, thus the users must always update with the latest cyber news to defend against the cyber-attacks.
ISSN:0094-243X
1551-7616
DOI:10.1063/5.0181914