The researcher first noticed that the malware was trying to contact a specific web address every time it infected a new computer. But the web address it was trying to contact - iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com - had not been registered. MalwareTech decided to register it, and bought it for $10.69 (£8). Owning it would let him see where computers were accessing it from, and give him an idea of how widespread the ransomware was.
But by doing so he triggered part of the ransomware's code that told it to continuing spreading as long as the website iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com did not exist. This type of code is known as a "kill switch", which some attackers use to halt the spread of their software if things get out of hand.
http://www.bbc.com/news/technology-39907049
Sister blog of Physicists of the Caribbean in which I babble about non-astronomy stuff, because everyone needs a hobby
Subscribe to:
Post Comments (Atom)
Review : Viking Britain
Hot on the heels of Neil Price's Children of Ash and Elm comes Thomas William's Viking Britain . Given how much I enjoyed his Lost...
-
Hmmm. [The comments below include a prime example of someone claiming they're interested in truth but just want higher standard, where...
-
Where Americans think Ukraine is These are the guesses of 2066 Americans as to where Ukraine is. Only 1 in 6 were correct. Presumably the...
-
I've noticed that some people care deeply about the truth, but come up with batshit crazy statements. And I've caught myself rationa...
No comments:
Post a Comment
Due to a small but consistent influx of spam, comments will now be checked before publishing. Only egregious spam/illegal/racist crap will be disapproved, everything else will be published.