
New Kill-Switch, New Sinkhole

ByCheck Point Threat Intelligence and Research team
Check Point Threat Intelligence and Research team has just registered a brand new kill-switch domain used by a fresh sample of the WannaCry Ransomware.
In the last few hours we witnessed a stunning hit rate of 1 connection per second.
Registering the domain activated the kill-switch, and these thousands of to-be victims are safe from the ransomware’s damage.
Our research shows that the kill-switch works the same as in earlier versions, and the rest of the code is similar to the older versions.
New kill-switch: ayylmaotjhsstasdfasdfasdfasdfasdfasdfasdf[.]com
MD5: 4287E15AF6191F5CAB1C92FF7BE8DCC3
You may also like
Check Point’s SASE Tops Scores for Threat Prevention
Known malware is dangerous, but the real risk lies in ...
January 2025’s Most Wanted Malware: FakeUpdates Continues to Dominate
Check Point Software’s latest threat index highlights that FakeUpdates continues ...
Love Gone Phishy: Check Point Research Exposes Valentine’s Day Cyber Threats
Key Findings In January 2025, we observed over 18,000 new ...
Exploring Q4 2024 Brand Phishing Trends: Microsoft Remains the Top Target as LinkedIn Makes a Comeback
Cyber criminals continue to refine their phishing tactics, targeting trusted ...