Welcome to Smokey's Security Forums.
Guests have only limited access to the board and it's features, please consider registering to gain full access!
Registration is free and it only takes a few moments to complete.

Smokey's Security Forums

Please login or register.

Login with username, password and session length
Advanced search  

News:

New XData ransomware spreads faster than WannaCry

Following the emergence of the WannaCry ransomware attack campaign last week, another, possibly bigger outbreak is underway.
The culprit? A new ransomware called XData.

New XData ransomware spreads faster than WannaCry

Malware Log Analysis & Removal Help * OTL (OldTimer ListIt) Tutorials & Tools * Ransomware Encryption & Decrytion Techniques * Official Jetico Inc. Support Forums

Share this topic on FacebookShare this topic on MySpaceShare this topic on RedditShare this topic on TwitterAuthorTopic: How WannaCrypt attacks  (Read 14 times)

0 Members and 1 Guest are viewing this topic.

ScarlettTopic starter

  • Updates Moderator
  • *
  • Offline Offline
  • location: Cymru
  • Posts: 22022
How WannaCrypt attacks
« Reply #1 on: May 17, 2017, 11:16:11 PM »
How WannaCrypt attacks
17 May 2017, 8:13 pm

WannaCrypt's roots -- the malware behind world's biggest ransomware attack ever -- lie in an old Windows network protocol.

Source: Latest topics for ZDNet in Security

This article is offered by CBS Interactive. All rights reserved.

>>> To obtain the full article, click the link in the first post line <<<
 

* Permissions
You can't post new topics.
You can't post replies.
You can't post attachments.
You can't modify your posts.
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Disabled


Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2017 Smokey Services™ -- All rights reserved
Design board graphics, banners and images by Meg&Millie - Emma aka Tinker

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques

    

  

Smokey's also provides free fully qualified FRST (Farbar Recovery Scan Tool) Log / Malware Analysis & Removal Help and System Health Checks
rifle
rifle
rifle
rifle