Traditional Culture Encyclopedia - Traditional stories - Which attack method used by wannacry is different from traditional computer viruses?
Which attack method used by wannacry is different from traditional computer viruses?
WannaCry uses an attack called EternalBlue.
According to relevant public information, it is a "network worm" attack method that exploits vulnerabilities in the Windows operating system.
A computer virus.
Investment giant Buffett said at the 2017 shareholders' meeting: The biggest threat facing mankind is cyberattacks, and the possibility of nuclear war is lower than biological and chemical weapons and cyberattacks.
Before he finished speaking, the WannaCry worm swept the world. This was a large-scale ransomware infection incident that continues.
Symmetric encryption means that the same key is used for encryption and decryption; asymmetric encryption uses a pair of keys, the public key is used for encryption and the private key is used for decryption.
The cryptographic technology vulnerability exploited by the Wannacry virus. The attack method of the Wannacry virus exploits the SMB vulnerability, which was originally discovered by the National Security Agency (NSA) of the United States.
The malware scans the TCP 445 port (Server Message Block/SMB) on the computer, spreads in a worm-like manner, attacks the host and encrypts files stored on the host, and then demands ransom payment in the form of Bitcoin.
The extortion amount ranges from $300 to $600.
WannaCry quickly infects and spreads through the MS17-010 vulnerability, and uses the RSA+AES encryption algorithm to encrypt files.
In other words, once a computer is infected, hosts with vulnerabilities in the same network will be actively attacked by it, so the number of infected hosts increases rapidly.
The spread is as follows: The virus is divided into a worm part and a ransomware part. The former is used to spread and release the virus, and the latter attacks users' encrypted files.
Worm is a common computer virus.
Propagated through the Internet and e-mail, it has the characteristics of self-replication and rapid dissemination.
- Previous article:How to view the traditional media and new media
- Next article:Model essay on opening report of medical papers
- Related articles
- Phlegm wet formation but very simple but very difficult to remove, adhere to do this 4 points, phlegm wet health is also very simple
- Three grades posted five Spring Festival couplets with 300 words.
- Sixty-four hexagrams of Zhouyi and six hexagrams of Tianshui lawsuit
- The creation of hotel cultural space?
- If you do a campus survey, what is a good topic? Help me make a questionnaire ~ ~ thank you.
- Which skin care products are suitable for Xinjiang?
- Ancient village characteristics of ancient buildings in Cuanxia village
- What are the regional characteristics of Naxi folk houses?
- What medicine is used to put essential balm in fish ponds?
- What are the characteristics of appreciating modern Chinese decoration style?