
Summary
This rule is designed to detect DNS queries made to known WannaCry killswitch domains. The WannaCry ransomware variant, which surfaced in May 2017, utilized a specific domain that, when contacted, could prevent the malware from encrypting the infected machine's files. By monitoring DNS queries that resolve to this killswitch domain, security teams can identify potential infections or attempts to contact command-and-control servers related to WannaCry. The rule triggers when any of the configured DNS queries match the selection criteria, indicating a possible attempt to reach the killswitch domain. The detection logic is implemented in a straightforward manner by matching selected known domain names against captured DNS logs. False positives may occur, as some analysts may inadvertently query these domains during their testing processes. The rule is highly relevant for organizations looking to monitor potential WannaCry ransomware activities in their network. Incident responses can be triggered based on alerts generated from this rule, enhancing an organization's security posture against this specific threat.
Categories
- Network
- Endpoint
- On-Premise
Data Sources
- Domain Name
- Network Traffic
- Application Log
Created: 2020-09-16