Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{145234,
author = {Twishish Shrimali and Dhruv Kapoor and Shagun Malhotra},
title = {WannaCry Ransomware Jeopardies the World},
journal = {International Journal of Innovative Research in Technology},
year = {},
volume = {4},
number = {8},
pages = {101-103},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=145234},
abstract = {This paper attempts to discover the furtive features of ransomware. It intends to analyze the Ransomware attack Wannacry that unnerved many countries and cybersecurity specialists on May 2017, and to help academic researchers and IT Specialists in understanding the characteristics of the attack .As the ransomware attacks have become more sophisticated and use complex algorithms, it can be intractable to decrypt the data without having the decryption key. This article will suggest necessary precautions that will benefit the users and the organizations in the long run},
keywords = {Cyber Security, Ransomware, Wanna Cry},
month = {},
}
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry