{"id":1995,"date":"2017-05-17T16:11:29","date_gmt":"2017-05-17T16:11:29","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1995"},"modified":"2020-05-06T10:27:59","modified_gmt":"2020-05-06T17:27:59","slug":"wannacry-and-jaff-two-different-ransomware-attacks-with-a-common","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\/","title":{"rendered":"WannaCry and Jaff: Two Different Ransomware Attacks with A Common Goal"},"content":{"rendered":"<p><span style=\"font-size: medium;\">The Infoblox Intelligence Unit observed two global malware outbreaks on Friday, May 12.\u00a0Although there is no indication that the two attacks were related, both were ransomware attacks with the goal of encrypting the victim\u2019s files, demanding a payment (mostly in the form of a Bitcoin payment) in order to decrypt them.<\/span><\/p>\n<p><span style=\"font-size: medium;\">Several reports conflated the two outbreaks based on the evidence at hand and the common use of ransomware.\u00a0 Subsequent investigation revealed that they were separate attacks utilizing different distribution capabilities and malware. It is important to understand the difference between the two attacks because each one requires slightly different remediation measures.<\/span><\/p>\n<p><span style=\"font-size: medium;\">The first attack, WannaCry, is a self-propagating worm, which leverages a known and patched vulnerability in Microsoft Server Message Block (SMB). It leverages an exploit called ETERNALBLUE and goes on to establish a backdoor known as DOUBLEPULSAR to allow for future access to the infected systems. WannaCry spreads by connecting to SMB services on local and Internet-facing systems with the vulnerability or running the backdoor.\u00a0 The malware then spreads laterally by attempting connections to all systems on the local network.<\/span><\/p>\n<p><span style=\"font-size: medium;\">During its initial infection WannaCry checks whether an external domain (killswitch domain) is available. If the killswitch domain can be contacted, the encryption function does not run.\u00a0 The killswitch domains are not a command-and-control server for the malware and should be monitored but not blocked. Before May 12, the domains were not registered.\u00a0 Shortly after the attack started, a\u00a0<a href=\"http:\/\/money.cnn.com\/2017\/05\/13\/technology\/hero-ransomware-malwaretech-cyberattack\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">malware researcher<\/a>\u00a0registered and sinkholed the first domain. This helped prevent a lot of later infections since the malware was able to resolve the domain. If left to run normally, WannaCry will encrypt most files on a machine. Once the files are encrypted, users will be prompted to pay $300 in Bitcoin to get their files back. The cost goes up to $600 if a user takes too long to pay, and eventually the user will be unable to pay to have files returned. \u00a0Note that Microsoft had issued a patch for the SMB vulnerability that was being exploited in March 2017. That patch was not universally implemented.<\/span><\/p>\n<p><span style=\"font-size: medium;\">While the world was preoccupied with WannaCry, there was another ransomware attack in progress called Jaff. The Jaff ransomware was launched by Necurs, one of the largest botnets in the world, notorious for spreading threats such as the Locky ransomware and the Dridex banking Trojan. It sends misleading emails to its victims encouraging them to open an attached PDF document. This document asks for additional permissions when opened and if approved, allows the delivery and execution of the ransomware payload. The emails used to deliver Jaff employ standard spam techniques, but the exact details vary between each of the concurrent campaigns.<\/span><\/p>\n<p><span style=\"font-size: medium;\">Once Jaff has been downloaded and executed by the malicious document it connects to its C2 servers to communicate that encryption of the victim\u2019s files has begun. Jaff then proceeds to encrypt the victim\u2019s files, instructs the victim to install Tor Browser, and directs the users to a specific web site that displays a ransom note and payment instructions. The exact amount demanded by the ransom varies over time, but currently averages around 2 Bitcoin (roughly $3,500 dollars).<\/span><\/p>\n<p><span style=\"font-size: medium;\"><strong>Best Practice Recommendations:<\/strong><\/span><\/p>\n<p><span style=\"font-size: medium;\">In the face of these attacks, organizations are asking what they can do.<\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium;\"><strong>Implementing patches in a timely manner:<\/strong>\u00a0WannaCry\u2019s reliance on a known vulnerability and network scanning indicates that some traditional defenses may be effective.\u00a0Ensuring timely software updates and keeping systems patched would eliminate the vulnerability and the worm\u2019s ability to spread through that exploit.\u00a0<\/span><\/li>\n<li><span style=\"font-size: medium;\"><strong>Sinkholing:<\/strong>\u00a0Unlike the typical command-and-control domains, which should be blocked, WannaCry used a killswitch domain which had to be resolved in order to avoid activating the ransomware\u2019s encryption function.\u00a0One best practice is for an enterprise to redirect its internal request for those domains to an internal sinkhole. Permitting the infected client to successfully connect to the killswitch domain will prevent the encryption function from completing. It will also enable the enterprise to identify its internal hosts that have been impacted by the malware.<\/span><\/li>\n<li><span style=\"font-size: medium;\"><strong>DNS Response Policy Zone (RPZ) capability:<\/strong>\u00a0Using RPZ capability on the DNS server to monitor any hits to the killswitch domain helps identify infected clients.<\/span><\/li>\n<li><span style=\"font-size: medium;\"><strong>Using\u00a0<\/strong><strong>up-to-date threat intelligence<\/strong>: organizations should leverage up-to-date and curated threat intelligence across their entire security and DNS infrastructures to protect against malicious activity and DNS<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium;\">Infoblox offers protection against ransomware and other DNS-based malware using up-to-date and curated threat intelligence. While Jaff was a novel threat, Infoblox had identified the malicious domain associated with Jaff and shared the information with our customers as early as April of this year. Infoblox threat intelligence feeds contained a number of the Necurs DGA domains used in the campaign and would have blocked the DNS resolution.<\/span><\/p>\n<p><span style=\"font-size: medium;\">We will discuss in more detail how well-architected and secure DNS solutions can help protect users against ransomware in a subsequent blog.<\/span><\/p>\n<p><span style=\"font-size: medium;\">To learn more, register for our coming webinars:<\/span><\/p>\n<ul>\n<li><span style=\"color: #0000ff; font-size: medium;\"><a href=\"https:\/\/event.on24.com\/eventRegistration\/EventLobbyServlet?target=reg20.jsp&amp;partnerref=may25_Webinar_newsletter&amp;eventid=1430396&amp;sessionid=1&amp;key=552E1D6EB2BEAD9ECD25DCE88BFF7D60&amp;regTag=&amp;sourcepage=register&amp;elqTrackId=913dd80fca384a60801e7e2f8c40aabd&amp;elq=a033238d8e9e49c2a63f4b6e982dbc9c&amp;elqaid=13031&amp;elqat=1&amp;elqCampaignId=\" target=\"_self\" rel=\"nofollow noopener noreferrer\">WannaCry and Jaff\u2014A Tale of Two Ransomware Attacks<\/a><\/span><\/li>\n<li><span style=\"color: #0000ff; font-size: medium;\"><a href=\"https:\/\/event.on24.com\/eventRegistration\/EventLobbyServlet?target=reg20.jsp&amp;partnerref=may26_webinar_newsletter&amp;eventid=1430407&amp;sessionid=1&amp;key=6A42E33A84D9527625D7B852B5464B5D&amp;regTag=&amp;sourcepage=register&amp;elqTrackId=9c14b60e4933455f8432103a52e0bc08&amp;elq=a033238d8e9e49c2a63f4b6e982dbc9c&amp;elqaid=13031&amp;elqat=1&amp;elqCampaignId=\" target=\"_self\" rel=\"nofollow noopener noreferrer\">The Role of DNS Instrumentation and DNS Data in Fighting Ransomware\u00a0<\/a><\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The Infoblox Intelligence Unit observed two global malware outbreaks on Friday, May 12.\u00a0Although there is no indication that the two attacks were related, both were ransomware attacks with the goal of encrypting the victim\u2019s files, demanding a payment (mostly in the form of a Bitcoin payment) in order to decrypt them. Several reports conflated the [&hellip;]<\/p>\n","protected":false},"author":262,"featured_media":894,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[16,73,32,15,48],"class_list":{"0":"post-1995","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-infoblox","9":"tag-iot-attacks","10":"tag-malware","11":"tag-security","12":"tag-threat","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>WannaCry and Jaff: Two Different Ransomware Attacks with A Common Goal<\/title>\n<meta name=\"description\" content=\"The Infoblox Intelligence Unit observed two global malware outbreaks on Friday, May 12.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WannaCry and Jaff: Two Different Ransomware Attacks with A Common Goal\" \/>\n<meta property=\"og:description\" content=\"The Infoblox Intelligence Unit observed two global malware outbreaks on Friday, May 12.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-17T16:11:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sean Tierney\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sean Tierney\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\\\/\"},\"author\":{\"name\":\"Sean Tierney\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/55f054bbb353d75a5e0efe8dc92b284e\"},\"headline\":\"WannaCry and Jaff: Two Different Ransomware Attacks with A Common Goal\",\"datePublished\":\"2017-05-17T16:11:29+00:00\",\"dateModified\":\"2020-05-06T17:27:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\\\/\"},\"wordCount\":851,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/threatindexblog.jpg\",\"keywords\":[\"Infoblox\",\"IoT Attacks\",\"Malware\",\"Security\",\"Threat\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\\\/\",\"name\":\"WannaCry and Jaff: Two Different Ransomware Attacks with A Common Goal\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/threatindexblog.jpg\",\"datePublished\":\"2017-05-17T16:11:29+00:00\",\"dateModified\":\"2020-05-06T17:27:59+00:00\",\"description\":\"The Infoblox Intelligence Unit observed two global malware outbreaks on Friday, May 12.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/threatindexblog.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/threatindexblog.jpg\",\"width\":660,\"height\":454,\"caption\":\"IPv6 and Internet Privacy\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"WannaCry and Jaff: Two Different Ransomware Attacks with A Common Goal\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/55f054bbb353d75a5e0efe8dc92b284e\",\"name\":\"Sean Tierney\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5f656f4e9ebbb35daf8795f52e58e883b048ddb46dac9687d6755cfc37fa34ab?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5f656f4e9ebbb35daf8795f52e58e883b048ddb46dac9687d6755cfc37fa34ab?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5f656f4e9ebbb35daf8795f52e58e883b048ddb46dac9687d6755cfc37fa34ab?s=96&d=blank&r=g\",\"caption\":\"Sean Tierney\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/sean-tierney\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"WannaCry and Jaff: Two Different Ransomware Attacks with A Common Goal","description":"The Infoblox Intelligence Unit observed two global malware outbreaks on Friday, May 12.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\/","og_locale":"en_US","og_type":"article","og_title":"WannaCry and Jaff: Two Different Ransomware Attacks with A Common Goal","og_description":"The Infoblox Intelligence Unit observed two global malware outbreaks on Friday, May 12.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\/","og_site_name":"Infoblox Blog","article_published_time":"2017-05-17T16:11:29+00:00","article_modified_time":"2020-05-06T17:27:59+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog.jpg","type":"image\/jpeg"}],"author":"Sean Tierney","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sean Tierney","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\/"},"author":{"name":"Sean Tierney","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/55f054bbb353d75a5e0efe8dc92b284e"},"headline":"WannaCry and Jaff: Two Different Ransomware Attacks with A Common Goal","datePublished":"2017-05-17T16:11:29+00:00","dateModified":"2020-05-06T17:27:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\/"},"wordCount":851,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog.jpg","keywords":["Infoblox","IoT Attacks","Malware","Security","Threat"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\/","url":"https:\/\/www.infoblox.com\/blog\/company\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\/","name":"WannaCry and Jaff: Two Different Ransomware Attacks with A Common Goal","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog.jpg","datePublished":"2017-05-17T16:11:29+00:00","dateModified":"2020-05-06T17:27:59+00:00","description":"The Infoblox Intelligence Unit observed two global malware outbreaks on Friday, May 12.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog.jpg","width":660,"height":454,"caption":"IPv6 and Internet Privacy"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/wannacry-and-jaff-two-different-ransomware-attacks-with-a-common\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"WannaCry and Jaff: Two Different Ransomware Attacks with A Common Goal"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/55f054bbb353d75a5e0efe8dc92b284e","name":"Sean Tierney","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5f656f4e9ebbb35daf8795f52e58e883b048ddb46dac9687d6755cfc37fa34ab?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5f656f4e9ebbb35daf8795f52e58e883b048ddb46dac9687d6755cfc37fa34ab?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5f656f4e9ebbb35daf8795f52e58e883b048ddb46dac9687d6755cfc37fa34ab?s=96&d=blank&r=g","caption":"Sean Tierney"},"url":"https:\/\/www.infoblox.com\/blog\/author\/sean-tierney\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1995","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/262"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1995"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1995\/revisions"}],"predecessor-version":[{"id":1997,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1995\/revisions\/1997"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/894"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1995"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1995"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1995"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}