
New Kill-Switch, New Sinkhole

ByCheck Point Threat Intelligence and Research team
Check Point Threat Intelligence and Research team has just registered a brand new kill-switch domain used by a fresh sample of the WannaCry Ransomware.
In the last few hours we witnessed a stunning hit rate of 1 connection per second.
Registering the domain activated the kill-switch, and these thousands of to-be victims are safe from the ransomware’s damage.
Our research shows that the kill-switch works the same as in earlier versions, and the rest of the code is similar to the older versions.
New kill-switch: ayylmaotjhsstasdfasdfasdfasdfasdfasdfasdf[.]com
MD5: 4287E15AF6191F5CAB1C92FF7BE8DCC3
You may also like
The Rise of VanHelsing RaaS: A New Player in the Ransomware Landscape
VanHelsing RaaS is a burgeoning ransomware-as-a-service (RaaS) platform that launched ...
Dark Storm Team Claims Responsibility for Cyber Attack on X Platform – What It Means for the Future of Digital Security
In a stark reminder of the growing threat posed by ...
The Growing Danger of Blind Eagle: One of Latin America’s Most Dangerous Cyber Criminal Groups Targets Colombia
Executive Summary Check Point Research (CPR) has uncovered a series ...
Unmasking Hacktivist Groups: A Modern Approach to Attribution
Hacktivism has evolved from grassroots digital protests to sophisticated, state-sponsored ...