Connect with us

Infographic: Understanding the WannaCry Ransomware

CYBER SECURITY

Infographic: Understanding the WannaCry Ransomware


It is the name for a prolific hacking attack and known to be “Ransomware”, that holds your laptop surety till you pay a ransom. WannaCry is also called encryption-based ransomware and known as Wanna Decryptor or WCRY. As soon as the WannaCry Ransomware creates encrypted copies of specific file varieties before deleting the originals, then the victims cannot access the encrypted file without the use of decoding key. WCRY encrypts users’ files mistreatment AES and RSA coding ciphers that depict the hackers and would directly decipher system files by employing a distinctive decoding key.

WannaCry to boot will increase the random quantity, and threaten the loss of information. At a planned time, making a way for emergencies and in great probability makes the victims pays the ransom. Creates lockers, that locks the victim out of the software system and not been possible to access the desktop and any apps or files. The files do not seem to be encrypted in this case, still, the attackers raise a ransom to unlock the infected laptop. They insist the users pay a US$300 ransom in bitcoins. The ransom note indicates that the payment quantity would be doubled in a span of every 3 days and the threat would be that if payment delayed or denied the encrypted files would be deleted.

The following infographic gives a better insight of WannaCry Ransomware:

Understanding WannaCry Ransomware: An Infographic

This Infographic – Understanding WannaCry Ransomware: An Infographic – was created by PROBESEVEN

Facebook Comments

We are a news site covering Technology and Business trends in Kenya, East Africa and across the Globe, including products and service reviews. For tips, story ideas, guest posts or advertising inquiries, email techtrendske@gmail.com or info@techtrendske.co.ke. You can also call us on +254 727 503 198

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

More in CYBER SECURITY

WATCH & SUBSCRIBE TO 24BIT TV

LISTEN TO OUR LATEST PODCAST ON 24BIT HERE

Subscribe to our mailing list

* indicates required

Latest News

Send us a Direct Message

To Top