WannaCry, the biggest ransomware laid on inwards the history, gained prominence really speedily inwards the media globally afterwards the ransomware infected to a greater extent than than 300,000 computers inwards over 150 countries inside simply 72 hours.
Governments, Intelligence agencies in addition to constabulary enforcement to a greater extent than or less the Earth get got already started their investigations in addition to are working closely alongside affected companies to rail downwardly hackers responsible for the global cyber attack launched on Friday, twelfth May.
Some researchers traced dorsum WannaCry to a state-sponsored hacking group inwards North Korea, spell other believed the perpetrators powerfulness last Chinese.
If you lot get got been next WannaCry coverage on The Hacker News, you lot should last aware of that the WannaCry ransomware uses Tor hidden service to communicate alongside its command-and-control server.
Just yesterday, nosotros came to know that French government had seized at to the lowest degree vi Tor's entry guard node servers, hosted on France-based hosting providers, simply ii days afterwards the outbreak of ransomware laid on spell investigating the WannaCry incident.
On 15th May, a French hacktivist, who uses online moniker ‘Aeris,’ informed Tor community that the official from Central Office for Combating Crime Related to Information in addition to Communication Technologies (OCLCTIC) raided the Online.net hosting provider in addition to get got seized his "kitten1" in addition to "kitten2" (torguard in addition to fallback directory) servers on 14th May.
Perhaps nobody was aware of the takedown of these servers inwards interrogation until the writer of WannaCry epidemic that hitting victims worldwide was using self-spreading capabilities to infect vulnerable Windows computers, especially those using older versions of the operating system.
While most of the affected organisations get got instantly returned to normal, constabulary enforcement agencies across the Earth are withal on the hunt.
Governments, Intelligence agencies in addition to constabulary enforcement to a greater extent than or less the Earth get got already started their investigations in addition to are working closely alongside affected companies to rail downwardly hackers responsible for the global cyber attack launched on Friday, twelfth May.
Some researchers traced dorsum WannaCry to a state-sponsored hacking group inwards North Korea, spell other believed the perpetrators powerfulness last Chinese.
If you lot get got been next WannaCry coverage on The Hacker News, you lot should last aware of that the WannaCry ransomware uses Tor hidden service to communicate alongside its command-and-control server.
Just yesterday, nosotros came to know that French government had seized at to the lowest degree vi Tor's entry guard node servers, hosted on France-based hosting providers, simply ii days afterwards the outbreak of ransomware laid on spell investigating the WannaCry incident.
On 15th May, a French hacktivist, who uses online moniker ‘Aeris,’ informed Tor community that the official from Central Office for Combating Crime Related to Information in addition to Communication Technologies (OCLCTIC) raided the Online.net hosting provider in addition to get got seized his "kitten1" in addition to "kitten2" (torguard in addition to fallback directory) servers on 14th May.
"Cops raided OVH, Online.net and FirstHeberg hosting providers on the footing of a electrical load filed yesteryear French Renault fellowship that was i of the victims of the WannaCry infection," Aeris told The Hacker News.
"I went to courtroom to get got access to information nearly the seizer of my servers, but it refused to furnish me alongside whatever information, in addition to fifty-fifty the providers are nether gag order."Aeris told THN that he is aware of the seizer of full vi Tor relays, operated yesteryear five operators.
Perhaps nobody was aware of the takedown of these servers inwards interrogation until the writer of WannaCry epidemic that hitting victims worldwide was using self-spreading capabilities to infect vulnerable Windows computers, especially those using older versions of the operating system.
While most of the affected organisations get got instantly returned to normal, constabulary enforcement agencies across the Earth are withal on the hunt.
Share This :
comment 0 Comments
more_vert