Researchers at Check Point spotted a new variant of WannaCry that used a different
kill switch domain (it pings it and if it finds it isn't registered, it activates the ransomware; for more details, check out the original post on this behavior).
Not exact matches
Hutchins, 22, played a pivotal and unlikely role in stopping the spread of malware known as WannaCry when he discovered a functional
domain kill switch for WannaCry.
The worm was eventually stopped when a security researcher who goes by the Twitter handle «MalwareTech» registered a
domain name that acted as a
kill switch for the worm.
The first variant, WannaCry 2.0 (a) pointed its
kill switch to a different Internet
domain, which promptly was registered and sinkholed, he told the E-Commerce Times.
The concept of malware
kill switches hit the mainstream in May, when a cybersecurity wunderkind managed to halt the spread of WannaCry by registering a
domain contained in the ransomware's...