SlideShare a Scribd company logo
SECURITY IN
COMPUTING
NIKITA SHUKLA-22623
SHASHANK MISHRA-22673
NIRAJ MORE-22654
WannaCry ransomware attack
 The WannaCry
ransomware attack was a
worldwide cyberattack in
May 2017 .
 Date 12 May 2017-15 May
2017.
Introduction:
 The WannaCry ransomware attack was one of the most significant cyber
attacks in recent history. In May 2017, a ransomware variant known as
WannaCry infected hundreds of thousands of computers across the globe,
causing widespread disruption and financial losses.
Creation of the WannaCry Ransomware
 WannaCry used the Eternal Blue exploit & Double Pulsar backdoor developed by the U.S. National
Security Agency (NSA) to spread through local networks.
EternalBlue exploit-
 It is a cyberattack exploit developed by U.S National Security Agency. It was leaked by the shadow
Brokers hacker group on April14,2017.
Double Pulsar-
 Double Pulsar is a backdoor implant tool developed by the U.S (NSA) Equarion group that was
leaked by The Shadow Brokers in early 2017.
 Double Pulsar runs in kernel mode, which grants cybercriminals a high level of control over the
computer.
Background:
 The WannaCry ransomware attack exploited a vulnerability in Microsoft Windows
operating systems which had been identified and patched by Microsoft two months
earlier.
 However, many organizations failed to update their systems, leaving them vulnerable
to the attack.
 The ransomware spread rapidly, using a worm-like mechanism to infect other
computers on the same network.
Impact:
The impact of the WannaCry ransomware attack was significant. It affected organizations in over 150
countries. Many organizations were forced to shut down their computer systems, leading to financial
losses and disrupted operations. The total cost of the attack has been estimated to be in the billions of
dollars.
Who stopped the WannaCry_Ransomware and
how??
 Hutchins said he stumbled across the solution when he was
analyzing a sample of the malicious code and noticed it was linked
to an unregistered web address.
 He promptly registered the domain, something he regularly does to
discover ways to track or stop cyber threats, and found that stopped
the worm from spreading.
Marcus Hutchins
How to protect yourself from Ransomware ???
 Update your software and operating system regularly
 Do not click on suspicious links
 Never open untrusted email attachments
 Do not download from untrusted websites
 Avoid unknown USBS
 Use a VPN when using public Wi-Fi
 Install internet security software
 Install Antivirus
 Back up your data
y Unknown Author is licensed under CC BY

More Related Content

Similar to SECURITY IN COMPUTING.pptx

WannaCry Ransomware
 WannaCry Ransomware WannaCry Ransomware
WannaCry Ransomware
Zoho Corporation
 
Crucial wannacryoutbreaks
Crucial wannacryoutbreaksCrucial wannacryoutbreaks
Crucial wannacryoutbreaks
kevinmass30
 
Ransomware (1).pdf
Ransomware (1).pdfRansomware (1).pdf
Ransomware (1).pdf
HiYeti1
 
WannaCry ransomware attack
WannaCry ransomware attackWannaCry ransomware attack
WannaCry ransomware attack
Abdelhakim Salama
 
Wannacry cyber attack.pptx
Wannacry cyber attack.pptxWannacry cyber attack.pptx
Wannacry cyber attack.pptx
machandi
 
What is wanna cry ransomware attack
What is wanna cry ransomware attackWhat is wanna cry ransomware attack
What is wanna cry ransomware attack
i-engage
 
Identify one cyberattack that occurred in the last 2 years. What cau.pdf
Identify one cyberattack that occurred in the last 2 years. What cau.pdfIdentify one cyberattack that occurred in the last 2 years. What cau.pdf
Identify one cyberattack that occurred in the last 2 years. What cau.pdf
fatoryoutlets
 
What is ransomware
What is ransomwareWhat is ransomware
What is ransomware
vikash saini
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomware
Jawhar Ali
 
Wannacry
WannacryWannacry
Wanna cry
Wanna cryWanna cry
Wanna cry
Aditya Pal
 
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About RansomwareWhat Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
MavrickHost - Reliable Hosting Partner
 
Defend Your Company Against Ransomware
Defend Your Company Against RansomwareDefend Your Company Against Ransomware
Defend Your Company Against Ransomware
Kevo Meehan
 
Ransomware 2017: New threats emerge
Ransomware 2017: New threats emergeRansomware 2017: New threats emerge
Ransomware 2017: New threats emerge
Symantec Security Response
 
Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | SysforeYour Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Sysfore Technologies
 
Zero day exploit
Zero day exploitZero day exploit
Zero day exploit
Aashiq Ahamed N
 
Prevent Phishing Attacks – CRI Advantage
Prevent Phishing Attacks – CRI AdvantagePrevent Phishing Attacks – CRI Advantage
Prevent Phishing Attacks – CRI Advantage
CRI Advantage
 
440890252-RANSOMWARE.cybersecurity-ppt.pptx
440890252-RANSOMWARE.cybersecurity-ppt.pptx440890252-RANSOMWARE.cybersecurity-ppt.pptx
440890252-RANSOMWARE.cybersecurity-ppt.pptx
sammadbasheer5
 
Ransomware
RansomwareRansomware
Ransomware
Chaitali Sharma
 
Case Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks TelefónicaCase Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks Telefónica
Sergio Renteria Nuñez
 

Similar to SECURITY IN COMPUTING.pptx (20)

WannaCry Ransomware
 WannaCry Ransomware WannaCry Ransomware
WannaCry Ransomware
 
Crucial wannacryoutbreaks
Crucial wannacryoutbreaksCrucial wannacryoutbreaks
Crucial wannacryoutbreaks
 
Ransomware (1).pdf
Ransomware (1).pdfRansomware (1).pdf
Ransomware (1).pdf
 
WannaCry ransomware attack
WannaCry ransomware attackWannaCry ransomware attack
WannaCry ransomware attack
 
Wannacry cyber attack.pptx
Wannacry cyber attack.pptxWannacry cyber attack.pptx
Wannacry cyber attack.pptx
 
What is wanna cry ransomware attack
What is wanna cry ransomware attackWhat is wanna cry ransomware attack
What is wanna cry ransomware attack
 
Identify one cyberattack that occurred in the last 2 years. What cau.pdf
Identify one cyberattack that occurred in the last 2 years. What cau.pdfIdentify one cyberattack that occurred in the last 2 years. What cau.pdf
Identify one cyberattack that occurred in the last 2 years. What cau.pdf
 
What is ransomware
What is ransomwareWhat is ransomware
What is ransomware
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomware
 
Wannacry
WannacryWannacry
Wannacry
 
Wanna cry
Wanna cryWanna cry
Wanna cry
 
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About RansomwareWhat Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
 
Defend Your Company Against Ransomware
Defend Your Company Against RansomwareDefend Your Company Against Ransomware
Defend Your Company Against Ransomware
 
Ransomware 2017: New threats emerge
Ransomware 2017: New threats emergeRansomware 2017: New threats emerge
Ransomware 2017: New threats emerge
 
Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | SysforeYour Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
 
Zero day exploit
Zero day exploitZero day exploit
Zero day exploit
 
Prevent Phishing Attacks – CRI Advantage
Prevent Phishing Attacks – CRI AdvantagePrevent Phishing Attacks – CRI Advantage
Prevent Phishing Attacks – CRI Advantage
 
440890252-RANSOMWARE.cybersecurity-ppt.pptx
440890252-RANSOMWARE.cybersecurity-ppt.pptx440890252-RANSOMWARE.cybersecurity-ppt.pptx
440890252-RANSOMWARE.cybersecurity-ppt.pptx
 
Ransomware
RansomwareRansomware
Ransomware
 
Case Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks TelefónicaCase Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks Telefónica
 

Recently uploaded

AN INTRODUCTION TO PUBLIC ADMINISTRATION.pptx
AN INTRODUCTION TO PUBLIC ADMINISTRATION.pptxAN INTRODUCTION TO PUBLIC ADMINISTRATION.pptx
AN INTRODUCTION TO PUBLIC ADMINISTRATION.pptx
schubergbestrong
 
PPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx llPPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx ll
MohammadZubair874462
 
Corporate Governance : Scope and Legal Framework
Corporate Governance : Scope and Legal FrameworkCorporate Governance : Scope and Legal Framework
Corporate Governance : Scope and Legal Framework
devaki57
 
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
15e6o6u
 
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdf
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdfPedal to the Court Understanding Your Rights after a Cycling Collision.pdf
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdf
SunsetWestLegalGroup
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
It's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of InterestIt's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of Interest
Parsons Behle & Latimer
 
17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf
ssuser0dfed9
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
RichardTheberge
 
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
15e6o6u
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
BridgeWest.eu
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
Justin Ordoyo
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
ssusera97a2f
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
MasoudZamani13
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
bhavenpr
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
gjsma0ep
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
SKshi
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?
RoseZubler1
 
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
abondo3
 

Recently uploaded (20)

AN INTRODUCTION TO PUBLIC ADMINISTRATION.pptx
AN INTRODUCTION TO PUBLIC ADMINISTRATION.pptxAN INTRODUCTION TO PUBLIC ADMINISTRATION.pptx
AN INTRODUCTION TO PUBLIC ADMINISTRATION.pptx
 
PPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx llPPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx ll
 
Corporate Governance : Scope and Legal Framework
Corporate Governance : Scope and Legal FrameworkCorporate Governance : Scope and Legal Framework
Corporate Governance : Scope and Legal Framework
 
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
 
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdf
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdfPedal to the Court Understanding Your Rights after a Cycling Collision.pdf
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdf
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
It's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of InterestIt's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of Interest
 
17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf17-03 2022 -full agreement full version .pdf
17-03 2022 -full agreement full version .pdf
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
 
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
 
Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?Should AI hold Intellectual Property Rights?
Should AI hold Intellectual Property Rights?
 
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
原版定做(sheffield学位证书)英国谢菲尔德大学毕业证文凭证书原版一模一样
 

SECURITY IN COMPUTING.pptx

  • 2. WannaCry ransomware attack  The WannaCry ransomware attack was a worldwide cyberattack in May 2017 .  Date 12 May 2017-15 May 2017.
  • 3. Introduction:  The WannaCry ransomware attack was one of the most significant cyber attacks in recent history. In May 2017, a ransomware variant known as WannaCry infected hundreds of thousands of computers across the globe, causing widespread disruption and financial losses.
  • 4.
  • 5. Creation of the WannaCry Ransomware  WannaCry used the Eternal Blue exploit & Double Pulsar backdoor developed by the U.S. National Security Agency (NSA) to spread through local networks. EternalBlue exploit-  It is a cyberattack exploit developed by U.S National Security Agency. It was leaked by the shadow Brokers hacker group on April14,2017. Double Pulsar-  Double Pulsar is a backdoor implant tool developed by the U.S (NSA) Equarion group that was leaked by The Shadow Brokers in early 2017.  Double Pulsar runs in kernel mode, which grants cybercriminals a high level of control over the computer.
  • 6. Background:  The WannaCry ransomware attack exploited a vulnerability in Microsoft Windows operating systems which had been identified and patched by Microsoft two months earlier.  However, many organizations failed to update their systems, leaving them vulnerable to the attack.  The ransomware spread rapidly, using a worm-like mechanism to infect other computers on the same network.
  • 7. Impact: The impact of the WannaCry ransomware attack was significant. It affected organizations in over 150 countries. Many organizations were forced to shut down their computer systems, leading to financial losses and disrupted operations. The total cost of the attack has been estimated to be in the billions of dollars.
  • 8. Who stopped the WannaCry_Ransomware and how??  Hutchins said he stumbled across the solution when he was analyzing a sample of the malicious code and noticed it was linked to an unregistered web address.  He promptly registered the domain, something he regularly does to discover ways to track or stop cyber threats, and found that stopped the worm from spreading. Marcus Hutchins
  • 9. How to protect yourself from Ransomware ???  Update your software and operating system regularly  Do not click on suspicious links  Never open untrusted email attachments  Do not download from untrusted websites  Avoid unknown USBS  Use a VPN when using public Wi-Fi  Install internet security software  Install Antivirus  Back up your data
  • 10. y Unknown Author is licensed under CC BY