2018 IEEE Symposium on Computers and Communications (ISCC) 2018
DOI: 10.1109/iscc.2018.8538354
|View full text |Cite
|
Sign up to set email alerts
|

An Investigation on Wannacry Ransomware and its Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 23 publications
(9 citation statements)
references
References 2 publications
0
9
0
Order By: Relevance
“…Spear‐phishing email fraud is specifically designed to get particular information or funds from an individual, organization, or company. Although many of these attacks aim to get confidential data for nefarious reasons, attackers may also want to deploy malware 12 on a targeted user's machine. While the email seems to be from a reputable sender, the receiver is sent to a fake website that contains malicious software instead of the intended recipient's inbox.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Spear‐phishing email fraud is specifically designed to get particular information or funds from an individual, organization, or company. Although many of these attacks aim to get confidential data for nefarious reasons, attackers may also want to deploy malware 12 on a targeted user's machine. While the email seems to be from a reputable sender, the receiver is sent to a fake website that contains malicious software instead of the intended recipient's inbox.…”
Section: Resultsmentioning
confidence: 99%
“…Many of the messages within the mail are identical to their actual corresponding object, but obviously, they have a missing domain name or extra subdomains. Most phishing emails are responsible for 94% of ransomware 12 and $132,000 per business email compromise incident. Around 1.5 m new phishing sites are created each month and 76% of businesses reported of being a victim of a phishing attack are implemented by the hackers by sending an email embedded with a malicious URL.When running target applications, users may unwittingly employ injected activities in place of the target apps' activities without realizing they are doing so 13,14 .…”
Section: Introductionmentioning
confidence: 99%
“…Several Advanced Persistent Threats conduct malware campaigns and majorly deliver ransomware. 2 Many sources on the internet predict the damage to cross US $30 billion by end of 2023. Others claim the increase of ransom-based cyber-attacks by 1885% on Governments and by 775% on health-care industry.…”
Section: Introductionmentioning
confidence: 99%
“…This is not only because of a ransom‐ware's high impact but also due to its ability of showing the compromises. Several Advanced Persistent Threats conduct malware campaigns and majorly deliver ransomware 2 . Many sources on the internet predict the damage to cross US $30 billion by end of 2023.…”
Section: Introductionmentioning
confidence: 99%
“…Vulnerabilities such as the MS17-010 EternalBlue exploit reveal how malware can propagate through corporate and home networks at speed and without user intervention which was a key software component to the propagation of the global WannaCry attack [24]. The arms race of security continues between security analysts and malicious software developers.…”
Section: Introductionmentioning
confidence: 99%