Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

WannaCry / WannaCrypt Ransomware Resources

Latest Resources about WannaCry / WannaCrypt Ransomware

Authored byViviana Ross
Webcast: Latest on WannaCry / WannaCrypt Ransomware

  • Recorded: Tuesday, May 16th Friday May 12 witnessed an unprecedented ransomware attack known as WCrypt, which targeted healthcare, government, telecom, universities and other industries around the world. Jake Williams and Renato Marinho have been on the frontlines of this ransomware battle since it broke, and will provide an update on the latest facts and analysis in this webcast. View Webcast Recording
Webcast: WannaCry Ransomeware Threat - What we know so far

  • Recorded: Friday, May 12th The WannaCry ransomware worm is unprecedented for two reasons. First, it's a ransomware worm. Second, it appears to be using a recently patched exploit that was stolen from NSA to propagate. Jake Williams' firm, Rendition Infosec, has been tracking the use of this exploit since it was publicly released and completed another internet wide scan of the Internet for this threat while you were in class today. Come learn what we know so far about the malware, the leaked exploits, mitigation strategies, and predictions for future impact. View Webcast Recording
WannaCry / WannaCrypt Information from Internet Storm Center

  • The SANS Internet Storm Center is on top of the WannaCry / WannaCrypt Ransomware attack. Johannes Ulrich, Dean of Research and a faculty member of the SANS Technology Institute, has produced an in-depth summary of the attack including a PPT presentation for Management and steps you can take to prevent Infection. Read the WannaCry / WannaCrypt Ransomware Summary.
Whitepaper: Reverse Engineering of WannaCry Worm and Anti Exploit Snort Rules 

370x200_WhitePapers_Sponsorship_Research_Content.jpg

  • Posted: May 27th 
  • Today, a lot of malware is being created and utilized. To solve this problem, many researchers study technologies that can quickly respond automatically to detected malware. Using artificial intelligence (AI) is such an example. However, modern AI has difficulty responding to new attack methods. On the other hand, malware consists of variants, and the root (core) part often uses the same technology. Download the paper

For other resources about Ransomware visit here

Latest resources about WannaCry/ WannaCrypt