RansomWare data mining
#4n6strider

RansomWare data mining

Recently, I did small research regarding how many different ransomware is found in the wild.

Point was to check, if WannaCry is big portion of what is actually going on in this filed.

Below is the picture with my finding. It is correlation of IP' s which sourced the malware, countries of origin, hashes of the droppers, destination file paths and affected processes, targeted operating systems and industries where the sample was first observed.

Due to confidential nature of data source I can publish only a few observations:

{Data collection was running during the WannaCry outbreak: 12th of May 2017 - 19th f May 2017.}

  • Red areas and links are WannaCry related. Note how small portion it was even during the outbreak.
  • Green stands for security software, which was somehow able to interfere in various stages of Ransomware killchain.
  • Orange belongs to the countries. Basically the only correlation between number if infections and country was here with the number of general internet users per country.
  • Blue parts stands for malicious IP's. Note that in some areas one IP is responsible for more than one type of attack. [Edit: Due to resolution limitation, blue parts are actually better visible in here]


[This visual is one of my favorites. It reminds me of female head profile. It was called "Ghost out of the Shell" and it's copyrighted by my project, 4n6strider. ]

要查看或添加评论,请登录

Jindrich Karasek的更多文章

  • Enhancing Defenses Against Cognitive Warfare through Cyber Threat Hunting, OSINT, and Ethical Hacking

    Enhancing Defenses Against Cognitive Warfare through Cyber Threat Hunting, OSINT, and Ethical Hacking

    {Consider this text as my public research notes, that I am building on while doing presentations, case studies, spot…

    2 条评论
  • A phishing story

    A phishing story

    Phishing threat is still valid and it remains the most prevalent way how the attacker get into the enterprise…

  • Election manipulation

    Election manipulation

    Introductory picture {Picture 0} below shows grouped website scan of Government of the Country. Various websites…

    1 条评论
  • Penetration test of Mobile devices WiFi

    Penetration test of Mobile devices WiFi

    Do you have a cellphone always connected to the internet? Do you connect to every public WiFi available? In article…

  • Let′s spy on malicious hackers!

    Let′s spy on malicious hackers!

    Lets spy on malicious hackers! On my website: https://4n6strider.it I reveal the hypothetical structure of a SIEM…

    3 条评论
  • Knowledge Management

    Knowledge Management

    The training is crucial part of every company' s security policy. There is an analysis below of a "Knowledge…

    1 条评论
  • Nmap on Twitter

    Nmap on Twitter

    This is only small post, an appetizer generated during processing, I will add more details in future on my website…

    2 条评论
  • A Botnet was using DNS tunneling for its C&C operations

    A Botnet was using DNS tunneling for its C&C operations

    Another great example of contribution of big data analysis to IT Security operations. Data were collected by using a…

    2 条评论
  • My own social network - hackers would love to do this.

    My own social network - hackers would love to do this.

    One of the good use cases for so called "big data" approach is modeling of private social network. Same of course…

  • IT Security meets Data Science

    IT Security meets Data Science

    Quote: The purpose of abstraction: “Is not to be vague but to create a new semantic level on which one can be…

社区洞察

其他会员也浏览了