This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

A Hack that Made the News

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

 

 

 

 

A Hack that Made the News

Student’s name

Lecture’s name

Course

Date

In May 2017, there was a ransomware attack that spread rapidly called the WannaCry, which took over the infected computers encrypting all the contents of their hard drives leading to a demanded payment in bitcoin decrypt them. A particular root was taken by malware in the computers in the facilities run by the NHS of the United Kingdom. There is an escalation in Ransomware, an increasingly sophisticated threat where no one seems to be immune. Therefore, Ransomware infects it, victims, through phishing emails that the hackers carefully crafted to trick the victim into opening an attachment or clicking on a file with malicious files in either form of word documents, zip, PDF or JavaScript. (Arntz, 2020) It, therefore, takes only one person who opens a phishing email infecting the whole organization.

The use of the Remote Desktop Protocol (RDP), an increasingly popular mechanism used by attackers. The protocol was previously was created for IT administrators to ably access a user’s machine to configure it remotely or use it and runs over port 3389. Once hackers are in as administrators, the ransomware encryption operation is initiated and disabled the endpoint security running on the machine, making the victims pay for the ransom due to the windows back up failing to exist. Attackers also used the Drive-By downloads from a compromised website to deliver the Ransomware since they take advantage of legitimate websites’ software vulnerabilities. The authorities were now to gather intelligence to patch the holes in their security, “should we have a policy about a matter that puts us at grave risk every day?” (Cameron, 2017).

Nmap and Metasploit are vital tools used by Ransomware. Networks are mapped, and ports scanned and used a raw IP packet to determine the hosts available on the network and provide information on the operating systems. The vulnerability is exploited by the tools, especially the Metasploit, which is considered a collection of the hacking tools and frameworks.

Reference

Arntz, Pieter (10 July 2020). “Threat spotlight: WastedLocker, customized ransomware.” Malwarebytes Labs. Retrieved 27 July 2020

Cameron, Dell (13 May 2017). “Today’s Massive Ransomware Attack Was Mostly Preventable; Here’s How to Avoid It.” Gizmodo. Retrieved 13 May 2017.

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask