Interestingly enough, security researchers now claim that there’s a clever and concerted campaign to bring the malware back from the dead. The strategy? Taking the kill-switch domain off-line by any means necessary.
According to a report from Wired, botnets are now being mobilized to launch a DDoS attack against the kill-switch domain.
Now a few devious hackers appear to be trying to combine those two internet plagues: They’re using their own copycats of the Mirai botnet to attack WannaCry’s kill-switch. So far, researchers have managed to fight off the attacks. But in the unlikely event that the hackers succeed, the ransomware could once again start spreading unabated.
Read More
I wonder if the kill-switch domain owner would eventually let the domain expire someday, sell it, or keep the killswitch domain running until most WannaCry infected computers spreading Ransomware are gone.
Hopefully, the DDoS against the Killswitch domain does not slow down other web users, and websites which use the same connection or server if it is using shared or VPS web hosting.
According to a report from Wired, botnets are now being mobilized to launch a DDoS attack against the kill-switch domain.
Now a few devious hackers appear to be trying to combine those two internet plagues: They’re using their own copycats of the Mirai botnet to attack WannaCry’s kill-switch. So far, researchers have managed to fight off the attacks. But in the unlikely event that the hackers succeed, the ransomware could once again start spreading unabated.
Read More
I wonder if the kill-switch domain owner would eventually let the domain expire someday, sell it, or keep the killswitch domain running until most WannaCry infected computers spreading Ransomware are gone.
Hopefully, the DDoS against the Killswitch domain does not slow down other web users, and websites which use the same connection or server if it is using shared or VPS web hosting.