Hacked

386 WannaCry Ransomware Samples Discovered

Short Bytes: According to the latest update, Trustlook has found 386 WannaCry ransomware samples in the wild. The hashes for files have been shared in a blog post. They’ve also released a WannaCry scanner and toolkit to help the sysadmins protect their networks.

WannaCry has hit hundreds of thousands of computer systems in more than 150 countries. This notorious ransomware used two NSA hacking tools to target legacy Windows operating systems.

According to security researchers from Trustlook, 386 WannaCry samples have been recorded in the wild. The hash for each sample can be found on this blog post.

Trustlook has released a scanner to help the system admins scan their network for vulnerable Windows computers. This tool can be found here. This tool needs Python 2.7 to run.

They’ve also released a WannaCry Vaccine tool to help the users prevent their system from attack. Related details can be found here.

Just in case you’re missing out on latest WannaCry updates, feel free to follow our extensive coverage.

Here’s the latest update on a new malware EternalRocks, which uses 7 NSA tools:

EternalRocks: New Malware Uses 7 NSA Hacking Tools, WannaCry Used Just 2

To Top

Pin It on Pinterest

Share This