Well, the ransomware attempts to connect to an unregistered domain after operating on victims computer.
Well, the tools can be used to hack computers running on Microsoft Windows.
If you are still unaware about WanaCrypt0r then you should probably visit thislink.

That means that as long as the domain was unregistered and inactive, the ransomware keeps expanding itself.
The researcher bought the domain for $10.69.
Once the URL went live after purchasing, the whole thing closed down.

Now when the code pinged that domain, it turn out to be purchased and then the ransomware deactivated.
The researcher claimed that a bit of analysis led him to the discovery of the domain.
However, finding the kill switch was accidental.

So, eventually, he pulled the plug without even realizing.
So, what do you think about this?
Share your views in the comment box below.