UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘WANNACRY FOR BEGINERS :

WannaCry encrypts most or even all of the files on your computer. The software then displays a specific message on the computer screen asking for a $ 300 ransom to decrypt your files. The payment must be made to the Bitcoin wallet. If the user does not pay the ransom in 3 days, the amount is doubled to $ 600. After 7 days, the virus will delete all encrypted files and all your data will be lost.



Who
is behind this or the origin of the virus
The exact origin of the virus has not yet been established. But our editor was able to find the 3 most basic versions.

1)Russian hackers
Yes, friends, how can you not bypass such a resonant virus without all your favorite "Russian hackers". The incident may be linked to recent warnings from the Shadow Brokers group to US President Donald Trump following his approved missile strikes in Syria.

2) US intelligence services
On May 15, Russian President Vladimir Putin called the US intelligence services the source of the virus and said that "Russia has absolutely nothing to do with it." Microsoft executives have also stated that the US intelligence services are the primary source of this virus.

3)Government of the DPRK
Representatives of the antivirus companies Symantec and Kaspersky Lab said that cybercriminals from the Lazarus Group were involved in cyber attacks using the WanaCrypt0r 2.0 virus, which hit thousands of computers in 150 countries .

DOWNLOAD : https://github.com/ytisf/theZoo/tree/master/malwares/Binaries/Ransomware.WannaCry

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ computer file anti-leakage systems :

1) The computer file anti-leakage system based on C/S architecture usually installs the management terminal on a computer in the LAN, installs the client on the controlled computer in the LAN, and then actively connects to the client through the management terminal and sends the computer to the client File encryption instruction, the client computer file is encrypted to prevent leakage of computer files.

2) Aiming at the channel for computer file leakage, the current mainstream computer file anti-leakage system in China usually effectively controls the external computer equipment. It prevents the passage by prohibiting the computer USB port, disabling optical drive burning, and prohibiting Bluetooth and PCI devices. Such external devices leaked secrets.

3) For the leakage of network channels, similar computer file anti-leakage systems, on the one hand, set to prohibit computers from accessing the Internet, on the other hand, it encrypts external files to prevent files from being sent through mailboxes, network disks, chat software, and other network channels. The computer file was sent out and the secret was leaked.

4) Many traditional computer file anti-leakage systems use the clipboard of the HOOK client computer to prevent the copying of computer files. However, because many copying and cutting actions of third-party software do not need to be implemented through the clipboard, it directly leads to The failure of this control method.

don't clone our tutorials
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁