{"id":10319,"date":"2020-04-27T01:15:02","date_gmt":"2020-04-27T01:15:02","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=10319"},"modified":"2026-04-17T18:07:49","modified_gmt":"2026-04-17T18:07:49","slug":"how-does-wannaren-ransomware-spread","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/how-does-wannaren-ransomware-spread\/","title":{"rendered":"How Does WannaRen Ransomware Spread?"},"content":{"rendered":"<p><!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\"><br \/>\n<html><body><\/p>\n<h2><strong>Background<\/strong><\/h2>\n<p>Recently, a new strain of ransomware WannaRen came to the surface and began to spread between PCs. This ransomware encrypts files in the Windows system and uses .WannaRen as the extension of encrypted files. The attacker leaves a Bitcoin wallet address and demands 0.05 Bitcoin as ransom. Through tracking and analysis, NSFOCUS&#8217;s emergency response team identified &#8220;KMS-activation-tool-19.5.2.exe&#8221; as the ransomware downloader, which disguises itself as an activation tool for users to download.<\/p>\n<p><!--more--><\/p>\n<h2><strong>How Is the Ransomware Distributed?<\/strong><\/h2>\n<ul>\n<li>Malware Disguised as an Activation Tool (KMS)<\/li>\n<\/ul>\n<p>Recently, a customer reported infections by a type of ransomware with the name of WannaRen, which was revealed in the ransom note. A sweeping check found that no computer was exposed to the MS17-010 vulnerability. After obtaining more information, we learned that the customer had downloaded a system activation tool KMS. A further investigation revealed that the KMS tool accessed some URLs for the load of other malicious programs.<\/p>\n<p>After anatomizing the tool, we discovered that the KMS-Activation-Tool-19.5.2.exe program was bundled with malicious PowerShell code, as shown in the following figure.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-1.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-10320\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"495\" height=\"352\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-1.jpg 495w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-1-300x213.jpg 300w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><\/p>\n<p>The execution of malicious code has a delay of 2000 seconds (33 minutes). This, to some extent, gives people a false impression that no malicious behavior is ongoing, thus delaying security researchers&#8217; analysis. If the system has antivirus software, such as 360 and QQProtect, in place, the malicious code will not be executed.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-2.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-10322\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-2.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"553\" height=\"218\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-2.jpg 553w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-2-300x118.jpg 300w\" sizes=\"(max-width: 553px) 100vw, 553px\" \/><\/a><\/p>\n<p>The core code is as follows:<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-3.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-10323\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-3.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"553\" height=\"86\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-3.jpg 553w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-3-300x47.jpg 300w\" sizes=\"(max-width: 553px) 100vw, 553px\" \/><\/a><\/p>\n<p>The core code&#8217;s purpose is to obtain and execute code in hxxp:\/\/cs.sslsngyl90.com.<\/p>\n<p>On the night of April 7, 2020, the code on the preceding page is as follows:<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-10324\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-4.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"553\" height=\"250\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-4.jpg 553w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-4-300x136.jpg 300w\" sizes=\"(max-width: 553px) 100vw, 553px\" \/><\/a><\/p>\n<p>The PowerShell script obtained from this page is for the purpose of downloading the program for local execution.<\/p>\n<p>In the script, WINWORD.EXE has a digital signature, enabling itself to bypass antivirus detection. wwlib.dll uses VMP as the packer, with the same compilation and packing information as WannaRen.<\/p>\n<p>PE information of the @WannaRen@.exe program is as follows:<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-5.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-10325\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-5.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"554\" height=\"264\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-5.jpg 554w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-5-300x143.jpg 300w\" sizes=\"(max-width: 554px) 100vw, 554px\" \/><\/a><\/p>\n<p>PE information of wwlib.dll is as follows:<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-6.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-10326\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-6.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"554\" height=\"264\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-6.jpg 554w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-6-300x143.jpg 300w\" sizes=\"(max-width: 554px) 100vw, 554px\" \/><\/a><\/p>\n<p>wwlib.dll could not run in the analysis environment, so it is hard to tell whether it conducted encryption. By the time when the article was written (April 4, 17:00), the published security analysis articles concerning this malware believed that this program (wwlib.dll) was the encryption module of WannaRen.<\/p>\n<h3><strong>Downloader Incorporating Backdoor, Ransomware, and Cryptojacker<\/strong><\/h3>\n<p>The preceding findings are but a tip of the iceberg. Other code in hxxp:\/\/cs.sslsngyl90.com will engage in more types of behavior, including:<\/p>\n<ul>\n<li>Downloading and executing cryptojackers (Monero)<\/li>\n<li>Downloading the EternalBlue kit and integrating bulk scanning tools<\/li>\n<li>Disguising a trojan as Everything to listen for local port 3611<\/li>\n<li>Using some drivers to create devices, such as \\\\Device\\\\WinRing0_1_2_0<\/li>\n<\/ul>\n<p>However, the virus has its own flaws. Some URLs have been invalid or would return a 404 error, resulting in the script exiting unexpectedly and stopping execution.<\/p>\n<h3><strong>Malware Being Continuously Updated<\/strong><\/h3>\n<p>On April 8, 2020, code in hxxp:\/\/cs.sslsngyl90.com was found to be updated, beginning with the following content:<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-7.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-10327\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-7.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"546\" height=\"217\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-7.jpg 546w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-7-300x119.jpg 300w\" sizes=\"(max-width: 546px) 100vw, 546px\" \/><\/a><\/p>\n<p>We can find that WINWORD.EXE and wwlib.dll, which are suspected to be ransomware, are replaced with the code responsible for Monero mining.<\/p>\n<h3><strong>Event Correlation<\/strong><\/h3>\n<p>The WINWORD.EXE and wwlib.dll programs found this time were closely correlated with a phishing event we handled in June 2019.<\/p>\n<p>The export function of wwlib.dll in the WannaRen event is as follows:<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-8.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-10328\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-8.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"489\" height=\"113\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-8.jpg 489w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-8-300x69.jpg 300w\" sizes=\"(max-width: 489px) 100vw, 489px\" \/><\/a><\/p>\n<p>The code of wwlib.dll loaded in WINWORD.EXE in the WannaRen event is as follows:<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-9.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-10329\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-9.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"547\" height=\"210\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-9.jpg 547w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-9-300x115.jpg 300w\" sizes=\"(max-width: 547px) 100vw, 547px\" \/><\/a><\/p>\n<p>The export function of wwlib.dll found in a phishing event of June 2019 is as follows:<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-10.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-10330\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-10.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"551\" height=\"147\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-10.jpg 551w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0427-10-300x80.jpg 300w\" sizes=\"(max-width: 551px) 100vw, 551px\" \/><\/a><\/p>\n<p>The names of export functions make it clear that the two events are strongly correlated. Both are disguised as the Word program to load the wwlib.dll file. In the phishing event of June 2019, wwlib.dll is a trojan with the callback IP address of 106.12.9.32.<\/p>\n<h2><strong>Mitigations<\/strong><\/h2>\n<ul>\n<li>Do not download or open files from unknown sources and properly back up and store critical data.<\/li>\n<li>Install and use terminal protection software with active defense capabilities and update the virus database immediately after a new release is available.<\/li>\n<\/ul>\n<h2><strong>Indicators of Compromise<\/strong><\/h2>\n<p><strong>URLs used by the downloader:<\/strong><\/p>\n<p>hxxp:\/\/cs.sslsngyl90.com<\/p>\n<p>hxxp:\/\/cpu.sslsngyl90.com\/vip.txt<\/p>\n<p><strong>Hashes of all modules:<\/strong><\/p>\n<p>WINWORD.EXE&nbsp;&nbsp; CEAA5817A65E914AA178B28F12359A46<\/p>\n<p>wwlib.dll&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 9854723BF668C0303A966F2C282F72EA<\/p>\n<p>you&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2D84337218E87A7E99245BD8B53D6EAB<\/p>\n<p>nb.exe&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; CA8AB64CDA1205F0993A84BC76AD894A<\/p>\n<p>officekms.exe&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 39E5B7E7A52C4F6F86F086298950C6B8<\/p>\n<p>WinRing0x64.sys&nbsp;&nbsp; 0C0195C48B6B8582FA6F6373032118DA<\/p>\n<h2><strong>Statement<\/strong><\/h2>\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n<h2><strong>About NSFOCUS<\/strong><\/h2>\n<p>NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. The company&#8217;s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against advanced cyber attacks.<\/p>\n<p>NSFOCUS works with Fortune Global 500 companies, including four of the world&#8217;s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA).<\/p>\n<p>A wholly owned subsidiary of NSFOCUS Technologies Group Co., Ltd., the company has operations in the Americas, Europe, the Middle East and Asia Pacific.<\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Background Recently, a new strain of ransomware WannaRen came to the surface and began to spread between PCs. This ransomware encrypts files in the Windows system and uses .WannaRen as the extension of encrypted files. The attacker leaves a Bitcoin wallet address and demands 0.05 Bitcoin as ransom. Through tracking and analysis, NSFOCUS&#8217;s emergency response [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":9738,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[5,6],"tags":[734],"class_list":["post-10319","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ddos-mitigation","category-emergency-response","tag-wannaren"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Does WannaRen Ransomware Spread? - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Does WannaRen Ransomware Spread? - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Background Recently, a new strain of ransomware WannaRen came to the surface and began to spread between PCs. This ransomware encrypts files in the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/how-does-wannaren-ransomware-spread\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-27T01:15:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1209-9.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How Does WannaRen Ransomware Spread? - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Background Recently, a new strain of ransomware WannaRen came to the surface and began to spread between PCs. This ransomware encrypts files in the\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1209-9.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/how-does-wannaren-ransomware-spread\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/how-does-wannaren-ransomware-spread\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"How Does WannaRen Ransomware Spread?\",\"datePublished\":\"2020-04-27T01:15:02+00:00\",\"dateModified\":\"2026-04-17T18:07:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/how-does-wannaren-ransomware-spread\\\/\"},\"wordCount\":1047,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/how-does-wannaren-ransomware-spread\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/1209-9.jpg\",\"keywords\":[\"WannaRen\"],\"articleSection\":[\"DDoS Mitigation\",\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/how-does-wannaren-ransomware-spread\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/how-does-wannaren-ransomware-spread\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/how-does-wannaren-ransomware-spread\\\/\",\"name\":\"How Does WannaRen Ransomware Spread? - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/how-does-wannaren-ransomware-spread\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/how-does-wannaren-ransomware-spread\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/1209-9.jpg\",\"datePublished\":\"2020-04-27T01:15:02+00:00\",\"dateModified\":\"2026-04-17T18:07:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/how-does-wannaren-ransomware-spread\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/how-does-wannaren-ransomware-spread\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/how-does-wannaren-ransomware-spread\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/1209-9.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/1209-9.jpg\",\"width\":515,\"height\":219,\"caption\":\"Cityscape with digital padlock and circuit design.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/how-does-wannaren-ransomware-spread\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Does WannaRen Ransomware Spread?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Does WannaRen Ransomware Spread? - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"How Does WannaRen Ransomware Spread? - NSFOCUS","og_description":"Background Recently, a new strain of ransomware WannaRen came to the surface and began to spread between PCs. This ransomware encrypts files in the","og_url":"https:\/\/nsfocusglobal.com\/how-does-wannaren-ransomware-spread\/","og_site_name":"NSFOCUS","article_published_time":"2020-04-27T01:15:02+00:00","article_modified_time":"2026-04-17T18:07:49+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1209-9.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"How Does WannaRen Ransomware Spread? - NSFOCUS","twitter_description":"Background Recently, a new strain of ransomware WannaRen came to the surface and began to spread between PCs. This ransomware encrypts files in the","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1209-9.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/how-does-wannaren-ransomware-spread\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/how-does-wannaren-ransomware-spread\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"How Does WannaRen Ransomware Spread?","datePublished":"2020-04-27T01:15:02+00:00","dateModified":"2026-04-17T18:07:49+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/how-does-wannaren-ransomware-spread\/"},"wordCount":1047,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/how-does-wannaren-ransomware-spread\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1209-9.jpg","keywords":["WannaRen"],"articleSection":["DDoS Mitigation","Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/how-does-wannaren-ransomware-spread\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/how-does-wannaren-ransomware-spread\/","url":"https:\/\/nsfocusglobal.com\/how-does-wannaren-ransomware-spread\/","name":"How Does WannaRen Ransomware Spread? - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/how-does-wannaren-ransomware-spread\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/how-does-wannaren-ransomware-spread\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1209-9.jpg","datePublished":"2020-04-27T01:15:02+00:00","dateModified":"2026-04-17T18:07:49+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/how-does-wannaren-ransomware-spread\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/how-does-wannaren-ransomware-spread\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/how-does-wannaren-ransomware-spread\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1209-9.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1209-9.jpg","width":515,"height":219,"caption":"Cityscape with digital padlock and circuit design."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/how-does-wannaren-ransomware-spread\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"How Does WannaRen Ransomware Spread?"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/10319","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=10319"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/10319\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/9738"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=10319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=10319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=10319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}