Ransomware News 2020 July - Úvod 2020 2019 2018 0 1 2 3
2020 - January February March April May June July August September October November December
H Ransomware Jak útoèí Klany Techniky Obrana Popisky Anti-Ramson Tool Rescue plan Anti-ransomware vaccine RansomFree Prevence Video Vývoj
26.7.20 | Karsten Hahn found a new CryptoWire variant called FlyingShip. | ||
26.7.20 | Karsten Hahn found a new ransomware that threatens "fry" files and append the .silvertor extension to encrypted files. | ||
26.7.20 | Michael Gillespie found a new STOP Ransomware variant that appends the .erif extension to encrypted files. | ||
26.7.20 | Arete Threat Intelligence continues to work with law enforcement contacts to conduct analysis into WastedLocker. The cyber criminals behind this variant have been quick to identify and infect victims’ systems with ransomware resulting in a devastating blow to the victims IT infrastructure and interrupting profitable business operations | ||
26.7.20 | JAMESWT found a new bootlocker that shows a link to a RickRoll YouTube Video. | ||
26.7.20 | UK govt warns of ransomware, BEC attacks against sports sector | The UK National Cyber Security Centre (NCSC) today highlighted the increasing risks posed by ransomware attacks, phishing campaigns, and Business Email Compromise (BEC) fraud schemes targeting sports organizations and teams, including Premier League football clubs. | |
26.7.20 | Garmin outage caused by confirmed WastedLocker ransomware attack | Wearable device maker Garmin shut down some of its connected services and call centers on Thursday following what the company called a worldwide outage, now confirmed to be caused by a WastedLocker ransomware attack. | |
26.7.20 | New in-dev Davinci ransomware | Leo found a new in-development ransomware that calls itself Davinci and only encrypts files on the desktop. Amigo-A states that this is a variant of the CobraLocker ransomware family. | |
26.7.20 | Enter the Maze: Demystifying an Affiliate Involved in Maze (SNOW) | Affiliate involved in Maze ransomware operations profiled from the actor perspective while also detailing their involvement in other groups. | |
26.7.20 | Lazarus hackers deploy ransomware, steal data using MATA malware | A recently discovered malware framework known as MATA and linked to the North Korean-backed hacking group known as Lazarus was used in attacks targeting corporate entities from multiple countries since April 2018 for ransomware deployment and data theft. | |
26.7.20 | Vitali Kremez posted a brief analysis of the Exorcist ransomware and how it avoids CIS countries. | ||
26.7.20 | MalwareHunterTeam found a new ransomware called Exorcist that is targeting enterprise networks and is promoted on hacker forums. | ||
26.7.20 | Michael Gillespie found a new Matrix ransomware variant that appends the .RE78P and drops the RE78P_README.rtf ransom note. | ||
26.7.20 | Michael Gillespie announced that ID Ransomware can now detect 900 ransomware families. | ||
26.7.20 | Michael Gillespie found a new ransomware/wiper that appends the .mechu4Po and .Ieph0uxo extensions or drops a ransom note named !!!ПРОЧИТАТЬ!!!.txt / README.txt. | ||
26.7.20 | A ransomware gang has infected the internal network of Telecom Argentina, one of the country's largest internet service providers, and is now asking for a $7.5 million ransom demand to unlock encrypted files. | ||
26.7.20 | Lorien Health Services discloses ransomware attack affecting nearly 50,000 | Lorien Health Services in Maryland announced that it was the victim of a ransomware incident in early June. Data was stolen and then encrypted during the incident. | |
26.7.20 | Sodinokibi\REvil Ransomware attacks against the Education Sector | Since January 2020, the Arete IR practice has responded to forty-one (41) Sodinokibi engagements. The industry has seen two big changes with Sodinokibi/REvil from their shift to exfiltrating data as of January 2020, and more, recently with their move to only accepting payments in Monero cryptocurrency (XMR). | |
19.7.20 | Michael Gillespie found a new STOP Ransomware variant that appends the .kuus extension to encrypted files. | ||
19.7.20 | Michael Gillespie found a new Maoloa Ransomware variant that appends the .Globeimposter-Alpha865qqz extension to encrypted files. | ||
19.7.20 | Michael Gillespie found a new Dharma Ransomware variant that appends the .spare extension to encrypted files. | ||
19.7.20 | Cloud provider stopped ransomware attack but had to pay ransom demand anyway | Blackbaud, a provider of software and cloud hosting solutions, said it stopped a ransomware attack from encrypting files earlier this year but still had to pay a ransom demand anyway after hackers stole data from the company's network and threatened to publish it online. | |
19.7.20 | Michael Gillespie found a new Makop Ransomware variant that appends the .BNFD extension to encrypted files. | ||
19.7.20 | Orange confirms ransomware attack exposing business customers' data | Orange has confirmed to BleepingComputer that they suffered a ransomware attack exposing the data of twenty of their enterprise customers. | |
19.7.20 | Recently, 360 Security Center has detected that a file encryption virus in the form of a hoax has appeared on the network. In view of the encrypted file suffix of the virus is named “.flowEncryption”, we named it “flowEncryption file encryption virus”. | ||
19.7.20 | Michael Gillespie is looking for a new ransomware that appends the .FastWind extension and drops a ransom note named ransomware.txt. | ||
19.7.20 | Michael Gillespie found a new Makop Ransomware variant that appends the .zbw extension and drops a ransom note named readme-warning.txt. | ||
19.7.20 | The chance of data being stolen in a ransomware attack is greater than one in ten | The data theft and name-and-shame tactics initiated by Maze in November 2019 and subsequently adopted by multiple other groups have blurred the line between ransomware attack and data breach. | |
19.7.20 | Jakub Kroustek found two new variants of the Dharma Ransomware that append either the .data or .smpl extension to encrypted files. | ||
19.7.20 | Michael Gillespie found a new STOP Ransomware variant that appends the .repl extension to encrypted files. | ||
19.7.20 | New AgeLocker Ransomware uses Googler's utility to encrypt files | A new and targeted ransomware named AgeLocker utilizes the 'Age' encryption tool created by a Google employee to encrypt victim's files. | |
19.7.20 | dnwls0719 found a new FonixCrypter variant that appends the .XINOF extension. | ||
19.7.20 | xiaopao found a new Matrix Ransomware variant that appends the .AL8P extension and drops a ransom note named Readme_AL8P.rtf. | ||
10.7.20 | JAMESWT found a new variant of the Thanos Ransomware that is asking for 20k ransom. | ||
10.7.20 | Michael Gillespie found a new Dharma variant that appends .smpl extension to encrypted files. | ||
10.7.20 | Jakub Kroustek found new variants of the Dharma Ransomware that append the .null, .felix, or the .gns extensions. | ||
10.7.20 | The Conti Ransomware is an upcoming threat targeting corporate networks with new features that allow it to perform quicker and more targeted attacks. There are also indications that this ransomware shares the same malware code as Ryuk, who has slowly been fading away, while Conti's distribution is increasing. | ||
10.7.20 | Michael Gillespie found a new Dharma variant that appends .teamV extension to encrypted files. | ||
10.7.20 | Michael Gillespie found the new Panther Ransomware that targets users in China. This ransomware appends the .panther extension and drops a ransom note named LOCKED_README.txt. | ||
10.7.20 | xiaopao found a CoronaCrypt Ransomware variant that appends the .Encrypted extension. | ||
10.7.20 | Michael Gillespie found a new FonixCrypter variant that appends the .repter extension. | ||
10.7.20 | The ThiefQuest malware, which was discovered last week, may not actually be ransomware according to new findings. The behaviors that have been documented thus far are still all accurate, but we no longer believe that the ransom is the actual goal of this malware. | ||
10.7.20 | Emsisoft released a decryptor for the SpartCrypt ransomware. | ||
10.7.20 | Poor coding of the ThiefQuest ransomware in disguise that targets macOS users allows the recovery of encrypted files, which would remain lost in lack of a backup. | ||
10.7.20 | Michael Gillespie found a new STOP Ransomware variant that appends the .maas extension. | ||
10.7.20 | Jakub Kroustek found new variants of the Dharma Ransomware that append the .bmtf or the .prnds extension. | ||
10.7.20 | EDP Renewables North America (EDPR NA) confirmed a Ragnar Locker ransomware attack that affected its parent corporation's systems, the Portuguese multinational energy giant Energias de Portugal (EDP). | ||
10.7.20 | Ransomware attack on insurance MSP Xchanging affects clients | Global IT services and solutions provider DXC Technology announced over the weekend a ransomware attack on systems from its Xchanging subsidiary. | |
10.7.20 | dnwls0719 found the IT Ransomware that appends the .IT extension to encrypted files. | ||
10.7.20 | Companies start reporting ransomware attacks as data breaches | Corporate victims are finally starting to realize that ransomware attacks are data breaches and have begun to notify employees and clients about data stolen data. | |
3.7.20 | A big portion of my work as malware analyst at G Data is writing detection signatures for our product. One of those signatures checks for a USB worm component that I have seen in certain variants of .NET based RATs like njRAT and BlackNet RAT. When this worm signature hit on an unidentified sample[1], I got curios. It was a .NET ransomware that seemed oddly familiar to me. I couldn’t put a finger on it yet. | ||
3.7.20 | S!Ri found the new Pojie ransomware that appends the .52pojie extension to encrypted files. | ||
3.7.20 | Jakub Kroustek has found two new Dharma Ransomware variants that append either the .NHLP or the .gyga extensions to encrypted files. | ||
3.7.20 | Surge of MongoDB ransom attacks use GDPR as extortion leverage | A flood of attacks is targeting unsecured MongoDB servers and wiping their databases. Left behind are notes demanding a ransom payment, or the data will be leaked, and the owners reported for GDPR violations. | |
3.7.20 | Dozens of US news sites hacked in WastedLocker ransomware attacks | The Evil Corp gang hacked into dozens of US newspaper websites owned by the same company to infect the employees of over 30 major US private firms using fake software update alerts displayed by the malicious SocGholish JavaScript-based framework. | |
3.7.20 | dnwls0719 found the Rabbit Ransomware that appends the .RABBIT extension to encrypted files. | ||
3.7.20 | Ravi found a variant of the MedusaLocker Ransomware that appends the .VinDizelPux extension. | ||
3.7.20 | ThiefQuest ransomware is a file-stealing Mac wiper in disguise | A new data wiper and info-stealer called ThiefQuest is using ransomware as a decoy to steal files from macOS users. The victims get infected after downloading trojanized installers of popular apps from torrent trackers. | |
3.7.20 | Business giant Xerox allegedly suffers Maze Ransomware attack | Maze ransomware operators have updated their list of victims adding Xerox Corporation to the roster. It appears that the encryption routine had completed on June 25. | |
3.7.20 | xiaopao found the Lolkek ransomware that appends the .lolkek extension to encrypted files. According to Amigo_A_, it may still be in development. | ||
3.7.20 | Michael Gillespie found a new STOP ransomware variant that appends the .zida extension. | ||
3.7.20 | A hacker gang is wiping Lenovo NAS devices and asking for ransoms | A hacker group going by the name of 'Cl0ud SecuritY' is breaking into old LenovoEMC (formerly Iomega) network-attached storage (NAS) devices, wiping files, and leaving ransom notes behind asking owners to pay between $200 and $275 to get their data back. | |
3.7.20 | How hackers extorted $1.14m from University of California, San Francisco | A leading medical-research institution working on a cure for Covid-19 has admitted it paid hackers a $1.14m (£910,000) ransom after a covert negotiation witnessed by BBC News. | |
3.7.20 | UC San Francisco pays $1.14 million for ransomware decryptor | The University of California San Francisco (UCSF) says that it paid $1.14 million to the Netwalker ransomware operators who successfully breached the UCSF School of Medicine’s IT network, stealing data and encrypting systems. | |
3.7.20 | Jakub Kroustek has found two new Dharma Ransomware variants that append either the .lxhlp or the .HOW extensions to encrypted files. |