The researcher first noticed that the malware was trying to contact a specific web address every time it infected a new computer. But the web address it was trying to contact - iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com - had not been registered. MalwareTech decided to register it, and bought it for $10.69 (£8). Owning it would let him see where computers were accessing it from, and give him an idea of how widespread the ransomware was.
But by doing so he triggered part of the ransomware's code that told it to continuing spreading as long as the website iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com did not exist. This type of code is known as a "kill switch", which some attackers use to halt the spread of their software if things get out of hand.
http://www.bbc.com/news/technology-39907049
Sister blog of Physicists of the Caribbean in which I babble about non-astronomy stuff, because everyone needs a hobby
Subscribe to:
Post Comments (Atom)
An Astonishing Level of Humanisation
I've mentioned the difficulties of both promoting/censoring violent action on social media before and I can't really think of much ...
-
"To claim that you are being discriminated against because you have lost your right to discriminate against others shows a gross lack o...
-
Where Americans think Ukraine is These are the guesses of 2066 Americans as to where Ukraine is. Only 1 in 6 were correct. Presumably the...
-
Hmmm. [The comments below include a prime example of someone claiming they're interested in truth but just want higher standard, where...
No comments:
Post a Comment
Due to a small but consistent influx of spam, comments will now be checked before publishing. Only egregious spam/illegal/racist crap will be disapproved, everything else will be published.