WANNACRY RANSOMWARE ANALYSIS

WannaCryptor, also known as WannaCry, is a ransomware that surfaced on Friday May 12th and instantly made international headlines. This great media attention is due to the ravages caused by this ransomware (crippled hospitals in the UK, massive infections at FedEx, Vodafone, Renault, etc.) as well as its capacity to propagate in a way that was never seen before. In fact, more than 200,000 computers spread over 150 countries were infected between May 12th and May 14th 2017. In this document, we analyze the behavior of the WannaCry ransomware, validating the capacity of our breach detection technology CDS to successfully detect it.

Spotlight

Network Vigilance

Network Vigilance is a leading provider of IT security and risk management services within the Southern California region. Since 1989, we have assisted organizations in solving their information technology security challenges within multiple industries. We provide services and solutions in the following areas: Risk Assessment & Penetration Testing - We provide risk assessments including Gap Analysis for companies who have compliance requirements including areas of SOX, GLBA/FFIEC, PCI, HIPAA, and others. We also provide penetration testing and assessment services to determine weaknesses in technology, processes, and personnel.

OTHER WHITEPAPERS
news image

Intel® Converged Security and Management Engine (Intel® CSME) Security

whitePaper | October 26, 2022

Intel platforms are designed with a strong built-in security foundation. This allows the ecosystem partners to help protect the platform data and to build more trusted applications.

Read More
news image

The Importance of Cybersecurity Threat Detection for Utilities

whitePaper | November 25, 2019

Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive approach to ensuring cyber protection is essential and should include cybersecurity threat detection as a standard element. But not all such cybersecurity solutions are created equal.

Read More
news image

Securing Today's Convenience Stores with Fortinet

whitePaper | June 14, 2023

Today’s convenience stores (C-Stores) rely on a variety of digital tools to support an evolving retail engagement model that includes everything within the store interior and the forecourt. This can involve point-of-sale (POS) infrastructure, self-service kiosks, intelligent building systems, digital signage, fuel dispensers, guest Wi-Fi, security cameras, loyalty system integration, and store-in-store services. Plus, today’s stores contain a wide array of Internet-of-Things (IoT) devices, such as walk-in cooler sensors and occupancy sensors. Protecting these critical systems against cyberthreats is paramount for compliance and maintenaning brand value.

Read More
news image

Cyber Security for Business

whitePaper | December 17, 2019

At CGI, cyber security is part of everything we do. For more than 40 years, we have helped clients manage complex security challenges with a business focused approach – protecting what is most valuable to them. As our economy becomes even more digital in nature, securing our organisations against cyber-attacks and data breaches has become one of the most important business issues facing senior management.

Read More
news image

GE Gas Power Cybersecurity Portal

whitePaper | October 31, 2022

GE Gas Power has developed a product security program based on industry-leading standards, encompassing end-toend cybersecurity through the entire software development lifecycle in conjunction with engineering, sourcing, and vulnerability and incident response. As part of this program, we have also created the Gas Power Cybersecurity Portal, a central, publicly available resource regarding cybersecurity at GE Gas Power.

Read More
news image

Amplify Your Ransomware Defenses: Protect, Detect and Recover

whitePaper | December 28, 2022

The Cohesity platform provides exceptional value for organizations to protect and manage vast enterprise data stores. But cyber criminals target data stores for various nefarious activities, most notably ransomware and data theft. Ransomware continues as the leading threat as it provides easy monetization, and therefore cyber criminals work non-stop to compromise organizations.

Read More

Spotlight

Network Vigilance

Network Vigilance is a leading provider of IT security and risk management services within the Southern California region. Since 1989, we have assisted organizations in solving their information technology security challenges within multiple industries. We provide services and solutions in the following areas: Risk Assessment & Penetration Testing - We provide risk assessments including Gap Analysis for companies who have compliance requirements including areas of SOX, GLBA/FFIEC, PCI, HIPAA, and others. We also provide penetration testing and assessment services to determine weaknesses in technology, processes, and personnel.

Events