Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
CPv8 HoneyPot Detection vs WannaCry (WannaCryptor or .WCRY) Ransomware
#1

Published on May 12, 2017
We put CryptoPrevent's HoneyPot Detection protection up against the latest WannaCry Ransomware (also known as WanaCrypt0r and WCry using .WCRY extension). It was able to block and kill the ransomware quickly where only two honeypot files were encrypted and no legitimate files on the system were affected. It was also able to kill the ransomware before it had a chance to add any startup entries so the system could be rebooted and cleaned if needed (but shutting down and cleaning ransomware in an offline state is always preferred and highly recommended).
Sorry for the bad audio this was recorded from a thin client almost 400 miles away from the system doing the video and audio recording, but you get the gist of it well enough I feel.
Also this shows a currently unreleased 8.0.3.5 version but the same protections demonstrated here have been in CryptoPrevent since the initial version 8 release and the update only has minor performance and small bug fixes that are unrelated to the protections shown. If you are on 8.0.3.4 (the latest version you should be protected just as well as shown here). The updated version should be released the beginning of next week, but no need to wait to stay protected now!
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Fake Ransomware | Petya & WannaCry Imitations baziroll 0 1,453 07-19-2017 , 12:31 AM
Last Post: baziroll
  WannaCry Ransomware Infection Heat Map baziroll 0 1,496 05-20-2017 , 02:35 PM
Last Post: baziroll
  WannaCry Ransomware: How it Attacks and How to Protect Your Business baziroll 0 1,398 05-18-2017 , 12:17 PM
Last Post: baziroll
  WannaCry Ransomware FAQ | What you need to know baziroll 0 1,316 05-16-2017 , 04:28 PM
Last Post: baziroll
  WannaCry Ransomware in Action | NSA Exploit based baziroll 0 1,785 05-13-2017 , 02:04 PM
Last Post: baziroll

Forum Jump:


Users browsing this thread: 1 Guest(s)