New Kill-Switch, New Sinkhole
ByCheck Point Threat Intelligence and Research team
Check Point Threat Intelligence and Research team has just registered a brand new kill-switch domain used by a fresh sample of the WannaCry Ransomware.
In the last few hours we witnessed a stunning hit rate of 1 connection per second.
Registering the domain activated the kill-switch, and these thousands of to-be victims are safe from the ransomware’s damage.
Our research shows that the kill-switch works the same as in earlier versions, and the rest of the code is similar to the older versions.
New kill-switch: ayylmaotjhsstasdfasdfasdfasdfasdfasdfasdf[.]com
MD5: 4287E15AF6191F5CAB1C92FF7BE8DCC3
You may also like
Meet FunkSec: A New, Surprising Ransomware Group, Powered by AI
Executive Summary: The FunkSec ransomware group emerged in late 2024 ...
Cracking the Code: How Banshee Stealer Targets macOS Users
Executive Summary: Since September, Check Point Research (CPR) has been ...
November 2024’s Most Wanted Malware: Androxgh0st Leads the Pack, Targeting IoT Devices and Critical Infrastructure
Check Point Software’s latest threat index highlights the rise of ...
The Exploitation of Gaming Engines: A New Dimension in Cybercrime
Executive Summary Check Point Research discovered a new technique using ...