Tags:

WannaCry Alert: Protect Yourself Now As Hackers Are Still Trying To Revive Attack

By Kachi Ojieh Tuesday, May 23, 2017
WannaCry Cyber Criminals image
Featured image source: iStock.

The "hero who saved the day" known as Marcus Hutchins, a 22 years old security expert from south-west England who works for Kryptos Logic based in Los Angeles has said that cyber criminals are attempting to overpower the website which he registered that turned into the supposed kill switch for WannaCry. The plan of the hackers is to restore the ransomware that tormented organizations around the globe.

Whenever WannaCry intends to infect a computer, it initially checks a vague address www[.]iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com to see whether the domain is registered. If the domain is truly occupied, WannaCry is terminated else it proceeds to encrypt a computer’s hard drive until the victim pays the ransom demanded.

Hackers are currently attempting to make Hutchins' domain inaccessible using a distributed denial of service (DDoS) attack. According to http://searchsecurity.techtarget.com “A distributed denial-of-service (DDoS) attack is an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource. The flood of incoming messages, connection requests or malformed packets to the target system forces it to slow down or even crash and shut down, thereby denying service to legitimate users or systems.”

If hackers succeed using DDoS attack, the web address www[.]iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com will be flooded with uncontrollable traffic and when Wannacry checks the address, there will be no feedback from it which automatically means the kill switch has been deactivated and it can proceed to infect computers.

Hutchins, who we believe is up to the task, has played the game safe by protecting the domain from the DDoS attacks by switching to a cached version of the website equipped for managing excess traffic loads more than the live website.

Up until this point, the kill switch is active and intact, Hutchins says, which ought to help any PC that have not been updated or secured from becoming a victim of WannaCry.


WannaCry infected computers running older versions of Microsoft Windows OS and the hackers demanded $300 to $600 as a ransom to be paid by victims or their data will be deleted.

Statistics computed by a cybersecurity firm Kaspersky, showed that Windows 7 OS was affected by WannaCry the most by 98%, with Windows XP representing an "inconsequential" volume of infections globally.

If you are yet to update your computer, now is the time to do it. Don’t fall a victim.

Additional resources
 1. WannaCry Hackers Still Trying To Revive Attack, Says Accidental Hero
WannaCry Cyber Criminals image
Featured image source: iStock.

The "hero who saved the day" known as Marcus Hutchins, a 22 years old security expert from south-west England who works for Kryptos Logic based in Los Angeles has said that cyber criminals are attempting to overpower the website which he registered that turned into the supposed kill switch for WannaCry. The plan of the hackers is to restore the ransomware that tormented organizations around the globe.

Whenever WannaCry intends to infect a computer, it initially checks a vague address www[.]iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com to see whether the domain is registered. If the domain is truly occupied, WannaCry is terminated else it proceeds to encrypt a computer’s hard drive until the victim pays the ransom demanded.

Hackers are currently attempting to make Hutchins' domain inaccessible using a distributed denial of service (DDoS) attack. According to http://searchsecurity.techtarget.com “A distributed denial-of-service (DDoS) attack is an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource. The flood of incoming messages, connection requests or malformed packets to the target system forces it to slow down or even crash and shut down, thereby denying service to legitimate users or systems.”

If hackers succeed using DDoS attack, the web address www[.]iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com will be flooded with uncontrollable traffic and when Wannacry checks the address, there will be no feedback from it which automatically means the kill switch has been deactivated and it can proceed to infect computers.

Hutchins, who we believe is up to the task, has played the game safe by protecting the domain from the DDoS attacks by switching to a cached version of the website equipped for managing excess traffic loads more than the live website.

Up until this point, the kill switch is active and intact, Hutchins says, which ought to help any PC that have not been updated or secured from becoming a victim of WannaCry.


WannaCry infected computers running older versions of Microsoft Windows OS and the hackers demanded $300 to $600 as a ransom to be paid by victims or their data will be deleted.

Statistics computed by a cybersecurity firm Kaspersky, showed that Windows 7 OS was affected by WannaCry the most by 98%, with Windows XP representing an "inconsequential" volume of infections globally.

If you are yet to update your computer, now is the time to do it. Don’t fall a victim.

Additional resources
 1. WannaCry Hackers Still Trying To Revive Attack, Says Accidental Hero

Post Tags:

Kachi Ojieh
Kachi Ojieh

"Tech Is Before Anything Else since 2017". Kachi Ojieh is the CEO and Founder of Tech Is Bae. An enthusiastic blogger with the heart to unify all tech lovers across the globe. Currently working to make sure readers keep coming back for more.

No Comment to " WannaCry Alert: Protect Yourself Now As Hackers Are Still Trying To Revive Attack "