From the course: Ethical Hacking: The Complete Malware Analysis Process
Unlock the full course today
Join today to access over 24,800 courses taught by industry experts.
Using cryptography in ransomware
From the course: Ethical Hacking: The Complete Malware Analysis Process
Using cryptography in ransomware
- [Instructor] Cryptography can be used to protect sensitive information, but it can also be used as a weapon to attack systems using what's known as ransomware. WannaCry is an early example of ransomeware, which became very popular with security researchers due to its use of EternalBlue, an NSA exploit that was released by the Shadow Brokers. It was an early example of cybercrime malware, which took advantage of nation-state-grade cyberattack techniques, almost always zero-days, to achieve a high level of propagation and exploitation. This is sometimes referred to as WCrypt, or WanaCrypt0r. We know how the WanaCrypt0r worm works, thanks to some in-depth analysis by a number of research teams. Sergei Shevchenko and Adrian Nish from the BAE Systems Applied Intelligence Threat Intelligence Research Team have provided a detailed blog of their analysis. Let's run through what we know about the worm from that. WannaCry can be sent via a phishing campaign. Alternatively, the attack can be…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
(Locked)
Hiding malware5m 31s
-
(Locked)
Malware that changes its spots1m 49s
-
(Locked)
Polymorphic malware5m 37s
-
(Locked)
Using cryptography in ransomware5m 20s
-
(Locked)
Understanding advanced persistent threats1m 30s
-
(Locked)
Analyzing Win32.Sodin3m 50s
-
(Locked)
Analyzing black and grey energy7m 32s
-
(Locked)
Understanding log4shell4m 22s
-
(Locked)
-
-