its is most danger one so pls take some safty measure to that
i said in the video if u have any doubt cmt below
some patch provide by microsoft ur windows not in the dnt worry download any anti-virus
security patch for windows-https://goo.gl/V6FY6O
How to Protect Yourself from Wanna Cry Ransomware?
How do I Prevent WannaCry Ransomware:
1. Backup your computer immediately
2. Update your operating system
3. Inatall Microsoft Security Bulletin MS17-010
Greetings dear citizens of the world,
We are Anonymous.
You probably already know this but this is a reminder of the computer attack carried out on more than 74 countries, the list could well reach a hundred countries
Around the world on Saturday 13 May.
Beginning Friday May 12, this hack is one of the most massive in history or even the largest ever discovered. Avast reports 75,000 detected computer attacks
Across the world just on Friday. The virus has attacked large companies such as Renault, which had to close factories, also Fedex, Telefonica
Forced to shut down its computers in Madrid, as well as many others. English hospitals have been affected making it impossible for necessary radios, treatments or
The posting of electronic bracelet on newborns.
The hackers are without doubt the "Shadow Brokers" who had previously flown to the NSA secret computer tools, moreover the famous Edward Snowden said:
"If the NSA had privately debated this flaw used to attack hospitals, when they" discovered "it, rather than when it was stolen,
It could have been avoided. "
The NSA had corrected the flaw before the group proclaimed the theft of data but the hack could not be avoided.
In order for you to understand better, here are some explanations on how the program works.
The hack works by "ransomware" or "ransomware", which blocks the computer system of the victim and takes hostage the data that are then
encrypted. A countdown then starts, so you have to pay the ransom before the end of the time or all the data is lost. The sum is
$ 300 to be paid by bitcoin. Obviously there is no guarantee that the data will be returned afterwards, the banking data can also be hacked during the
The hack is a trojan horse, it is sent by mail and launches after the opening of it but it can also and especially spread without anybody opens
An email or click on a link but by local network.
The virus exploits a Windows flaw, patches are available to protect itself for Windows Server 2003, Windows XP, Windows 8, may also be for Windows 7. So it is
Recommended to install the MS17-010 patch.
WannaCry Ransomware is even stoppable, indeed MalwareTech has discovered the address of a website in software code.
"The virus was trying to connect to this site when it was broadcast, and if the site was unreachable, it continued to spread.
For sale, MalwareTech simply bought it, activating without realizing the emergency mechanism that seemed to have been planned by the creators of the software and
Stopping its spread. "
In 2017, while some want us to believe that it is almost impossible to hacker or cracker, we Anonymous want to remind you that never any network
Will only be 100% protected, just find the fault and wait for the perfect moment.
This was a message from the collective Anonymous France.
We are Anonymous,
We are Legion,
We do not forget,
We do not forgive,
Map of the evolution of the hack across the world: https://www.nytimes.com/interactive/2...
If you are infected, try this: https://pastebin.com/aaW2Rfb6
The patch: https://technet.microsoft.com/library...
A very quick behavioural analysis of WannaCry / wanacry 2.0 / wanacrypt0r ransomware. Filmed in one take with a view to show how to really quickly analyse a sample, dump some network indicator strings and show the persistence mechanisms of the sample. MD5 84c82835a5d21bbcf75a61706d8ab549
Update: Many people have asked for the contents of IPs.txt, see here for the contents: https://pastebin.com/Z212gfEC
Also note that there are many samples in the wild with varying indicators. The IPs in this sample are therefore not an exhaustive list of all you need to monitor / block etc. Some good information being pulled together is also stored here: https://gist.github.com/rain-1/989428..