The researcher first noticed that the malware was trying to contact a specific web address every time it infected a new computer. But the web address it was trying to contact - iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com - had not been registered. MalwareTech decided to register it, and bought it for $10.69 (£8). Owning it would let him see where computers were accessing it from, and give him an idea of how widespread the ransomware was.
But by doing so he triggered part of the ransomware's code that told it to continuing spreading as long as the website iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com did not exist. This type of code is known as a "kill switch", which some attackers use to halt the spread of their software if things get out of hand.
http://www.bbc.com/news/technology-39907049
Sister blog of Physicists of the Caribbean in which I babble about non-astronomy stuff, because everyone needs a hobby
Subscribe to:
Post Comments (Atom)
Whose cloud is it anyway ?
I really don't understand the most militant climate activists who are also opposed to geoengineering . Or rather, I think I understand t...
-
"To claim that you are being discriminated against because you have lost your right to discriminate against others shows a gross lack o...
-
For all that I know the Universe is under no obligation to make intuitive sense, I still don't like quantum mechanics. Just because some...
-
Hmmm. [The comments below include a prime example of someone claiming they're interested in truth but just want higher standard, where...
No comments:
Post a Comment
Due to a small but consistent influx of spam, comments will now be checked before publishing. Only egregious spam/illegal/racist crap will be disapproved, everything else will be published.