<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ransomware Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/ransomware/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Fri, 21 May 2021 21:35:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>How to enable ransomware protection in Windows 10</title>
		<link>https://www.osradar.com/how-to-enable-ransomware-protection-in-windows-10/</link>
					<comments>https://www.osradar.com/how-to-enable-ransomware-protection-in-windows-10/#respond</comments>
		
		<dc:creator><![CDATA[roger]]></dc:creator>
		<pubDate>Thu, 27 May 2021 21:34:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[ransomware protection]]></category>
		<category><![CDATA[Windows 10]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=30245</guid>

					<description><![CDATA[<p>Hello! Windows has a number of features to protect files from external threats. Indeed, one of them is controlled access to folders. Let&#8217;s see how it works. It is well known that ransomware has become a serious threat. They are malicious codes hidden in applications or documents. They are introduced into the computer to encrypt [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-enable-ransomware-protection-in-windows-10/">How to enable ransomware protection in Windows 10</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hello! Windows has a number of features to protect files from external threats. Indeed, one of them is controlled access to folders. Let&#8217;s see how it works. It is well known that <a href="https://www.osradar.com/a-new-type-of-ransomware-seriously-threatens-windows-10/" target="_blank" rel="noreferrer noopener">ransomware </a>has become a serious threat. They are malicious codes hidden in applications or documents. They are introduced into the computer to encrypt documents and hijack them. The hackers then demand a ransom in exchange for decrypting the documents. Indeed, many companies and individuals have suffered attacks of this type. Therefore, it is advisable to take precautionary measures. For this reason, today we will show you how to enable ransomware protection in Windows 10.</p>



<h2>How to activate the ransomware protection integrated into Windows 10</h2>



<p>Certainly, there are several methods of protection against these threats. Some of them require a paid subscription. However, there are also free options. For example, Windows 10 includes protection against Ransomware. Specifically the Controlled Folder Access feature. This is a system to lock files to an external application or code. Which ensures that no one can access and control folders without our authorization. Let&#8217;s see how to activate it.</p>



<p>The first thing you have to do is to go to the <strong>Windows Settings.</strong> Once there, select <strong>Update and Security.</strong></p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="787" src="https://www.osradar.com/wp-content/uploads/2021/05/ran-1024x787.png" alt="Please go to Update &amp; Security. " class="wp-image-30246" srcset="https://www.osradar.com/wp-content/uploads/2021/05/ran-1024x787.png 1024w, https://www.osradar.com/wp-content/uploads/2021/05/ran-300x231.png 300w, https://www.osradar.com/wp-content/uploads/2021/05/ran-768x590.png 768w, https://www.osradar.com/wp-content/uploads/2021/05/ran-696x535.png 696w, https://www.osradar.com/wp-content/uploads/2021/05/ran-1068x821.png 1068w, https://www.osradar.com/wp-content/uploads/2021/05/ran.png 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption>Please go to Update &amp; Security.</figcaption></figure>



<p>Next, click on <strong>Windows Security.</strong></p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="787" src="https://www.osradar.com/wp-content/uploads/2021/05/ran2-1024x787.png" alt="Entering Windows Security. " class="wp-image-30247" srcset="https://www.osradar.com/wp-content/uploads/2021/05/ran2-1024x787.png 1024w, https://www.osradar.com/wp-content/uploads/2021/05/ran2-300x231.png 300w, https://www.osradar.com/wp-content/uploads/2021/05/ran2-768x590.png 768w, https://www.osradar.com/wp-content/uploads/2021/05/ran2-696x535.png 696w, https://www.osradar.com/wp-content/uploads/2021/05/ran2-1068x821.png 1068w, https://www.osradar.com/wp-content/uploads/2021/05/ran2.png 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption>Entering Windows Security.</figcaption></figure>



<p>Next, just click on <strong>Virus &amp; Threat Protection.</strong></p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="787" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2021/05/ran3-1024x787.png" alt="" class="wp-image-30252" srcset="https://www.osradar.com/wp-content/uploads/2021/05/ran3-1024x787.png 1024w, https://www.osradar.com/wp-content/uploads/2021/05/ran3-300x231.png 300w, https://www.osradar.com/wp-content/uploads/2021/05/ran3-768x590.png 768w, https://www.osradar.com/wp-content/uploads/2021/05/ran3-696x535.png 696w, https://www.osradar.com/wp-content/uploads/2021/05/ran3-1068x821.png 1068w, https://www.osradar.com/wp-content/uploads/2021/05/ran3.png 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>This action will display the Windows 10 security module. Once there, you can see the security status of the system. Indeed, you can scan the system for threats, among other things. Please scroll down to <strong>Ransomware protection. </strong>Then click on <strong>Manage Ransomware protection.</strong></p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="787" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2021/05/ran4-1024x787.png" alt="Reviewing Ramsonware protection settings" class="wp-image-30254" srcset="https://www.osradar.com/wp-content/uploads/2021/05/ran4-1024x787.png 1024w, https://www.osradar.com/wp-content/uploads/2021/05/ran4-300x231.png 300w, https://www.osradar.com/wp-content/uploads/2021/05/ran4-768x590.png 768w, https://www.osradar.com/wp-content/uploads/2021/05/ran4-696x535.png 696w, https://www.osradar.com/wp-content/uploads/2021/05/ran4-1068x821.png 1068w, https://www.osradar.com/wp-content/uploads/2021/05/ran4.png 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption>Reviewing Ramsonware protection settings</figcaption></figure>



<p>Then, just turn on the switch to activate the protection.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="787" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2021/05/ran5-1024x787.png" alt="" class="wp-image-30259" srcset="https://www.osradar.com/wp-content/uploads/2021/05/ran5-1024x787.png 1024w, https://www.osradar.com/wp-content/uploads/2021/05/ran5-300x231.png 300w, https://www.osradar.com/wp-content/uploads/2021/05/ran5-768x590.png 768w, https://www.osradar.com/wp-content/uploads/2021/05/ran5-696x535.png 696w, https://www.osradar.com/wp-content/uploads/2021/05/ran5-1068x821.png 1068w, https://www.osradar.com/wp-content/uploads/2021/05/ran5.png 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption>Enabling Ransomware Protection in Windows 10</figcaption></figure>



<p>From now on, you only have to configure the application. Since it is easier to restrict access to personal files. Well, we have seen how to enable Ransomware protection in <a href="https://www.microsoft.com/en-us/software-download/windows10" target="_blank" rel="noreferrer noopener">Windows 10.</a> Note that you have to make regular backups of all data and files. This way, if we are victims of an attack it will not be necessary to pay ransom for the data. Security experts strongly advise against paying any kind of ransom. This will prevent us from being the target of future attacks. See you soon!</p>



<p></p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-enable-ransomware-protection-in-windows-10/">How to enable ransomware protection in Windows 10</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/how-to-enable-ransomware-protection-in-windows-10/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>This driver shuts down the antivirus and installs ransomware in Windows</title>
		<link>https://www.osradar.com/this-driver-shuts-down-the-antivirus-and-installs-ransomware-in-windows/</link>
					<comments>https://www.osradar.com/this-driver-shuts-down-the-antivirus-and-installs-ransomware-in-windows/#respond</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Sat, 08 Feb 2020 00:54:15 +0000</pubDate>
				<category><![CDATA[Tools]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[robbinhood]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows 10]]></category>
		<guid isPermaLink="false">https://windowsmen.com/?p=179</guid>

					<description><![CDATA[<p>Hi, how are you? It&#8217;s amazing how hackers refine their techniques to attack pcs. Additionally, they continue to seek to breach user and operating system security measures. So we will see how this driver shuts down the antivirus and installs ransomware in Windows. Specifically, this threatens the vulnerability of a legitimate Gigabyte driver to disable [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/this-driver-shuts-down-the-antivirus-and-installs-ransomware-in-windows/">This driver shuts down the antivirus and installs ransomware in Windows</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hi, how are you? It&#8217;s amazing how hackers refine their techniques to attack pcs. Additionally, they continue to seek to breach user and operating system security measures.  So we will see how this driver shuts down the antivirus and installs ransomware in  Windows. Specifically, this threatens the vulnerability of a legitimate <a rel="noreferrer noopener" aria-label="Gigabyte (opens in a new tab)" href="https://www.gigabyte.com/" target="_blank">Gigabyte</a> driver to disable the antivirus and install complex ransomware on the pc. Before we continue, let&#8217;s see what ransomware is. This is a malware program that infects the computer. Additionally, it displays messages that require the payment of money to restore the system&#8217;s functionality. </p>



<p>It acts by blocking the device remotely, to encrypt the files taking away the control of all the information and data stored. The virus launches a pop-up window asking for the payment of a ransom. This payment is usually made in virtual currency. On the other hand, this software can be installed through misleading links included in an email, instant message or website. Windows.</p>



<h2>How ransomware RobbinHood works</h2>



<p>As mentioned above, this threat acts through a Gigabyte company driver (gdrv.sys). This has a security flaw, so the exploit included with ransomware allows the attacker to disable the antivirus. It is not even necessary to have a Gigabyte device installed. Finally, attackers use the vulnerability of the genuine driver, to install a second driver created by them without a digital signature. The purpose of this second driver is to disable the antivirus. Consequently, ransomware can be installed without any problem. </p>



<figure class="wp-block-image size-large td-caption-align-https://windowsmen.com/wp-content/uploads/2020/02/hacker-2300772_1280.jpg"><img src="https://windowsmen.com/wp-content/uploads/2020/02/hacker-2300772_1280-1024x682.jpg" alt="" class="wp-image-180"/></figure>



<p>With the antivirus turned off, ransomware installs itself on the pc, takes full control and encrypts all data present on the hard disk. It then displays a message like the one below, asking to pay for the data or we won&#8217;t be able to recover it.</p>



<figure class="wp-block-image size-large"><img src="https://windowsmen.com/wp-content/uploads/2020/02/ram.jpg" alt="Message from ransomware requesting ransom for the files" class="wp-image-181"/><figcaption>Message from ransomware requesting ransom for the files</figcaption></figure>



<p>The exploit that takes advantage of the security flaw is hidden in a file called Steel.exe. When executed, a file is extracted with ransomware (ROBNR.EXE). In addition to the two drivers, the vulnerable one (signed by Gigabyte) and the one developed by the hackers. As mentioned above, it is not necessary to have any Gigabyte components on the computer. The ransomware itself will install the Gigabyte driver on our PC and carry out the attack. The ransomware asks to pay a Bitcoin money within the next 4 days. If not, the cost will increase to $10,000 per day over the next 6 days. Eventually, the keys will be removed from the server and the data will be lost forever.</p>



<p>According to computer experts, this is the first time that ransomware uses a reliable third-party driver to attack the Windows kernel. In addition to loading a second malicious unsigned driver. And finally, disabling the antivirus directly from the operating system kernel.</p>



<h2>Gigabyte knew about the bug, but she didn&#8217;t fix it.</h2>



<p>In a supreme display of irresponsibility, the Gigabyte company has known about this mistake since December 2018. However, the manufacturer decided to abandon driver support instead of fixing it. Consequently, users were exposed to this security problem until the attack happened. Security experts claim that there is no way to defend against this ransomware. That is, even with a good antivirus and all the security patches installed, the attack is inevitable.</p>



<figure class="wp-block-image size-large td-caption-align-https://windowsmen.com/wp-content/uploads/2020/02/man-4190930_1280.jpg"><img src="https://windowsmen.com/wp-content/uploads/2020/02/man-4190930_1280-1024x586.jpg" alt="" class="wp-image-183"/></figure>



<p>As always, the best way to protect yourself against hackers is to use common sense. That is, avoid downloading and using illegal programs. Also, be wary of an unknown e-mail. It is also healthy to check the websites you visit. On the other hand, it is advisable to keep your data backed up in the cloud or on external hard drives. In this way, you can avoid falling into threats. Finally, we have seen how this driver shuts down the antivirus and installs ransomware in WindowsThis is all for now before I go I invite you to see our post about repairing the <a rel="noreferrer noopener" aria-label=" (opens in a new tab)" href="https://windowsmen.com/the-windows-10-search-bar-doesnt-work-how-to-fix-it/" target="_blank">search bar </a>in Windows 10.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/this-driver-shuts-down-the-antivirus-and-installs-ransomware-in-windows/">This driver shuts down the antivirus and installs ransomware in Windows</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/this-driver-shuts-down-the-antivirus-and-installs-ransomware-in-windows/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>A new variant of Snatch ransomware threatens Windows 10.</title>
		<link>https://www.osradar.com/a-new-variant-of-snatch-ransomware-threatens-windows-10/</link>
					<comments>https://www.osradar.com/a-new-variant-of-snatch-ransomware-threatens-windows-10/#respond</comments>
		
		<dc:creator><![CDATA[roger]]></dc:creator>
		<pubDate>Wed, 11 Dec 2019 21:32:56 +0000</pubDate>
				<category><![CDATA[Desktop]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[snatch]]></category>
		<category><![CDATA[Windows 10]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=16510</guid>

					<description><![CDATA[<p>Hello, how are you? This time we are going to talk about security in Windows 10. Specifically about the ransomware is known as Snatch. Ransomware is a type of malware whose purpose is to block the use of a computer or part of the information stored on it. This way the user cannot access the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/a-new-variant-of-snatch-ransomware-threatens-windows-10/">A new variant of Snatch ransomware threatens Windows 10.</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p> Hello, how are you? This time we are going to talk about security in Windows 10. Specifically about the <a rel="noreferrer noopener" href="https://searchsecurity.techtarget.com/definition/ransomware" target="_blank">ransomware</a> is known as Snatch. Ransomware is a type of malware whose purpose is to block the use of a computer or part of the information stored on it. This way the user cannot access the data or the computer itself. Consequently, the attacker asks for a monetary ransom in order to be able to access the information. Well, in the last few hours it has transpired that ransomware Snatch has refined its attack mode. The method consists of restarting the PCs you have just infected in safe mode. This a way of booting Windows used to diagnose a problem and resolve software conflicts. Let&#8217;s see how the new variant of Snatch ransomware threatens Windows 10. </p>



<h2>This is the new Snatch mode.</h2>



<p>It does not cease to surprise the evolution of computer attackers to violate the systems. It is well known that during the safe mode, some antivirus programs do not work. In this way, many problems are solved, but there is also a security gap. Snatch programmers have discovered that by using a key in the Windows registry they are able to program the restart in this mode.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="678" src="//1723336065.rsc.cdn77.org/wp-content/uploads/2019/12/ransomware-2321110_1280-1024x678.jpg" alt="" class="wp-image-16512" srcset="https://www.osradar.com/wp-content/uploads/2019/12/ransomware-2321110_1280-1024x678.jpg 1024w, https://www.osradar.com/wp-content/uploads/2019/12/ransomware-2321110_1280-300x199.jpg 300w, https://www.osradar.com/wp-content/uploads/2019/12/ransomware-2321110_1280-768x508.jpg 768w, https://www.osradar.com/wp-content/uploads/2019/12/ransomware-2321110_1280-696x461.jpg 696w, https://www.osradar.com/wp-content/uploads/2019/12/ransomware-2321110_1280-1068x707.jpg 1068w, https://www.osradar.com/wp-content/uploads/2019/12/ransomware-2321110_1280-635x420.jpg 635w, https://www.osradar.com/wp-content/uploads/2019/12/ransomware-2321110_1280.jpg 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>It was Sophos Lab&#8217;s team that discovered how this new modality works. They declare that it is an effective technique and that it could be copied by other ransomware. For that reason, they made the information public so that preventive measures can be taken in the future. Now, this ransomware has been attacking since 2018. What is new is this safe mode reboot mode. Additionally, it does not attack home users and is not massively propagated by spam campaigns. On the contrary, they carefully choose their targets among large companies and government organizations. However, Snatch is refining its techniques by not only extorting money but also stealing data with the intention of then filtering it online.</p>



<p>We have finally seen how the new variant of Snatch ransomware threatens Windows 10. For that reason, I advise you to redouble your security measures when surfing the Internet. It is always advisable to be aware of the sites you visit and the files you open. All right, that&#8217;s it for now. Before saying goodbye I invite you to review our post on <a rel="noreferrer noopener" aria-label="Codeblocks (opens in a new tab)" href="https://www.osradar.com/how-to-install-codeblocks-in-windows-10/" target="_blank">Codeblocks</a> in Windows</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/a-new-variant-of-snatch-ransomware-threatens-windows-10/">A new variant of Snatch ransomware threatens Windows 10.</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/a-new-variant-of-snatch-ransomware-threatens-windows-10/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SynAttack Ransomware Now Using Process Doppelgänging</title>
		<link>https://www.osradar.com/synattack-ransomware-now-using-process-doppelganging/</link>
					<comments>https://www.osradar.com/synattack-ransomware-now-using-process-doppelganging/#respond</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Tue, 08 May 2018 14:43:19 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[synattack]]></category>
		<category><![CDATA[synattack ransomware]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=2953</guid>

					<description><![CDATA[<p>Ransomware is one of the most heinous pieces of software floating in the cyber world. They attack a computer, encrypts its files and asks for ransom in the change of decryption of the file. SynAttack is one of such ransomware. Recently, an improved edition of this ransomware was spotted online that is using a better [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/synattack-ransomware-now-using-process-doppelganging/">SynAttack Ransomware Now Using Process Doppelgänging</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Ransomware is one of the most heinous pieces of software floating in the cyber world. They attack a computer, encrypts its files and asks for ransom in the change of decryption of the file. SynAttack is one of such ransomware. Recently, an improved edition of this ransomware was spotted online that is using a better method for getting into systems.</p>
<p>According to security researchers, this ransomware is now using “process doppelgänging” technique. This is essentially a code injection system. This system abuses the NTFS mechanism of Windows to create and hide malicious processes inside the system. Thus, the ransomware also hides from the antivirus software and effectively takes over the system.</p>
<h3>SynAttack ransomware comes back</h3>
<p>SynAttack ransomware strain was the nightmare during August &amp; September 2017 that infected systems all over the world. Back then, this malware was a simpler threat comparing to the present day threats.</p>
<p>That’s because the malware was still in its development process. Recently, a report of Kaspersky tells us that the brand new malware is well-developed. It now uses top-class encryption routine, evading detection with process doppelgänging and above all, the core of it is tightly protected for protection against any reverse engineering.</p>
<p>The spreading method is still not so clear. Back in the day when SynAttack emerged and caused a ruckus, the malware strain used badly-secured or insecure (open) RDP connections. There’s been no major patch-up for the RDP scheme as there’s no major malware that used this path. It’s safe to assume that the crooks are using the same method for infiltrating into systems with the latest SynAttack variant.</p>
<p>Here are the messages you’ll get once SynAttack gets you. The best way to stay protected is to protect your remote desktop connection with the powerful password and use better encryption systems. Moreover, make sure that remote desktop service is turned off properly so that it’s unavailable in your system temporarily.</p>
<p><img loading="lazy" class="size-full wp-image-2955 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/05/synattack-welcome-message.png" alt="" width="881" height="483" srcset="https://www.osradar.com/wp-content/uploads/2018/05/synattack-welcome-message.png 881w, https://www.osradar.com/wp-content/uploads/2018/05/synattack-welcome-message-300x164.png 300w, https://www.osradar.com/wp-content/uploads/2018/05/synattack-welcome-message-768x421.png 768w, https://www.osradar.com/wp-content/uploads/2018/05/synattack-welcome-message-696x382.png 696w, https://www.osradar.com/wp-content/uploads/2018/05/synattack-welcome-message-766x420.png 766w" sizes="(max-width: 881px) 100vw, 881px" /></p>
<p><img loading="lazy" class="size-full wp-image-2956 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/05/synattack-ransom-note-windows.png" alt="" width="967" height="847" srcset="https://www.osradar.com/wp-content/uploads/2018/05/synattack-ransom-note-windows.png 967w, https://www.osradar.com/wp-content/uploads/2018/05/synattack-ransom-note-windows-300x263.png 300w, https://www.osradar.com/wp-content/uploads/2018/05/synattack-ransom-note-windows-768x673.png 768w, https://www.osradar.com/wp-content/uploads/2018/05/synattack-ransom-note-windows-696x610.png 696w, https://www.osradar.com/wp-content/uploads/2018/05/synattack-ransom-note-windows-480x420.png 480w" sizes="(max-width: 967px) 100vw, 967px" /></p>
<p>Presently, robots are also in the threat of ransomware. <a href="https://www.osradar.com/robots-under-ransom-threat-of-future/">Learn about the robot ransomware – the future threat</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/synattack-ransomware-now-using-process-doppelganging/">SynAttack Ransomware Now Using Process Doppelgänging</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/synattack-ransomware-now-using-process-doppelganging/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>LockCrypt Ransomware is cracked!</title>
		<link>https://www.osradar.com/lockcrypt-ransomware-is-cracked/</link>
					<comments>https://www.osradar.com/lockcrypt-ransomware-is-cracked/#respond</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Sat, 07 Apr 2018 09:49:05 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[lockcrypt]]></category>
		<category><![CDATA[lockcrypt solutin]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=2423</guid>

					<description><![CDATA[<p>Ransomware is the trend of today’s malware attacks. We’ve seen some of the greatest ransomware attacks in the field. WannaCry was most feared. Following WannaCry, other campaigns also launched in the world, asking for ransom in cryptocurrency. However, a ransomware “LockCrypt” has been cracked, thanks to the developer’s intellect and the hacker’s poor implementation of [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/lockcrypt-ransomware-is-cracked/">LockCrypt Ransomware is cracked!</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Ransomware is the trend of today’s malware attacks. We’ve seen some of the greatest ransomware attacks in the field. WannaCry was most feared. Following WannaCry, other campaigns also launched in the world, asking for ransom in cryptocurrency. However, a ransomware “LockCrypt” has been cracked, thanks to the developer’s intellect and the hacker’s poor implementation of encryption.</p>
<p>The team at Malwarebytes identified a weakness in the encryption scheme that LockCrypt used. Using the weakness, the team could successfully exploit the ransomware to recover the encrypted files. Now, they can help other LockCrypt victims to get back their files.</p>
<h3>LockCrypt attack events</h3>
<p>The first time this ransomware was identified was last June. It’s also thought that the group responsible for LockCrypt also distributed Satan ransomware. The most significant attack of LockCrypt was taking over the network of Mecklenburg Country in North Carolina.</p>
<p>However, the ransomware wasn’t so active. It’s because the group didn’t distribute the malware via any phishing campaign or spams. LockCrypt groups installed the ransomware manually into the hacked systems after successfully breaking into organization’s networks via RDP.</p>
<p>At first, it created files with “.lock” extension. Then, it switched to “.2018” and “.1btc” respectively.</p>
<h3>LockCrypt is sloppy</h3>
<p>According to the researchers at Malwarebytes team, this ransomware was poorly coded. Moreover, the encryption method wasn’t powerful at all. They also criticized the sense of understanding of encryption of the hacker group. The ransomware used a custom version of encryption method instead of using the proven, powerful ones in the market. This led to an easier solution with this one.</p>
<p>Researchers were also able to discover an unencrypted LockCrypt sample. By analyzing the sample, they were able to find out a lot more about the sloppy ransomware.</p>
<p>If you’re a victim of LockCrypt, you contact Malwarebytes team. For Mac users, it’s time to be careful as a new backdoor is being spread through phishing campaign and an infected MS Word document. <a href="https://www.osradar.com/macos-backdoor-spreading-through-ms-word-document/">Learn how to stay safe from the new Mac backdoor</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/lockcrypt-ransomware-is-cracked/">LockCrypt Ransomware is cracked!</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/lockcrypt-ransomware-is-cracked/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Zenis Ransomware – Deletes Your Backup and Encrypts Files</title>
		<link>https://www.osradar.com/zenis-ransomware-deletes-your-backup-and-encrypts-files/</link>
					<comments>https://www.osradar.com/zenis-ransomware-deletes-your-backup-and-encrypts-files/#respond</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Sun, 18 Mar 2018 06:33:54 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[zenis]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=2183</guid>

					<description><![CDATA[<p>Ransomware has been the hot topic of security world for quite a few months. This is a type of attack that encrypts a system’s file and asks for a ransom to the victim for the unlocking password. Recently, we’ve seen a new ransomware infecting systems – Zenis. Discovered by MalwareHunterTeam, this ransomware deletes your file [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/zenis-ransomware-deletes-your-backup-and-encrypts-files/">Zenis Ransomware – Deletes Your Backup and Encrypts Files</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Ransomware has been the hot topic of security world for quite a few months. This is a type of attack that encrypts a system’s file and asks for a ransom to the victim for the unlocking password. Recently, we’ve seen a new ransomware infecting systems – Zenis. Discovered by MalwareHunterTeam, this ransomware deletes your file backups on purpose!</p>
<p>Zenis</p>
<p>When MalwareHunterTeam discovered the ransomware, it was using an unidentified method of file encryption. However, the latest edition of the malware is using the AES encryption method for encrypting files. Once encrypted, there’s no way to decrypt the files, but Michael Gillespie, a security researcher, is analyzing the malware for any weakness.</p>
<p>It’s still unknown how this ransomware is getting across devices, but the scenarios indicate that it’s using Remote Desktop services to infect other systems.</p>
<h3>The working method of Zenis</h3>
<p>The current variation of the ransomware performs 2 steps to see if it should encrypt the current system.</p>
<ul>
<li>A process (iis_agent32.exe) is running</li>
<li>A registry key (HKEY_CURRENT_USER\SOFTWARE\ZenisService “Active”) is present in the system.</li>
</ul>
<p>If the steps return NO, then it won’t encrypt the system. If the answer is YES, it will start its preparation to encrypt the system. Here’s the ransom note from Zenis.</p>
<p><img loading="lazy" class="wp-image-2184 size-full aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/03/zenis-ransomware-ransom-note.png" alt="" width="1240" height="771" srcset="https://www.osradar.com/wp-content/uploads/2018/03/zenis-ransomware-ransom-note.png 1240w, https://www.osradar.com/wp-content/uploads/2018/03/zenis-ransomware-ransom-note-300x187.png 300w, https://www.osradar.com/wp-content/uploads/2018/03/zenis-ransomware-ransom-note-768x478.png 768w, https://www.osradar.com/wp-content/uploads/2018/03/zenis-ransomware-ransom-note-1024x637.png 1024w, https://www.osradar.com/wp-content/uploads/2018/03/zenis-ransomware-ransom-note-356x220.png 356w, https://www.osradar.com/wp-content/uploads/2018/03/zenis-ransomware-ransom-note-696x433.png 696w, https://www.osradar.com/wp-content/uploads/2018/03/zenis-ransomware-ransom-note-1068x664.png 1068w, https://www.osradar.com/wp-content/uploads/2018/03/zenis-ransomware-ransom-note-675x420.png 675w" sizes="(max-width: 1240px) 100vw, 1240px" /></p>
<p>The key point is, the creator of this ransomware holds the private RSA key required to decrypt the base64 encoded files. That’s why the note. However, the ransomware is under analysis, so don’t pay the ransom until it’s completely analyzed.</p>
<h3>How to stay protected</h3>
<p>First of all, it’s unknown how this ransomware is getting distributed into networks, so you have to follow caution while operating your system. Moreover, good usage habits are more important than anything to prevent any such attack. Here’s a short list of what to do and what not.</p>
<ul>
<li>Backup – It’s the most important thing to do in your life. Backup your important files to an external storage that’s not connected to the computer. This allows your data a safe position, in case the original source is corrupted or encrypted.</li>
<li>Anti-malware – Malware is the culprit of such attacks. To ensure the protection of your system, you have to install a proper anti-malware software. We have the list of <a href="https://www.osradar.com/best-antivirus-software-2018/">best antivirus software of 2018</a>.</li>
<li>File attachments – When someone sends you an attached file with the email, make sure not to open it until you know the sender is an authorized one. If anything looks suspicious, scan the file using VirusTotal first.</li>
<li>Software update – All the software vendors release updates of their software regularly with enhanced security and performance. Update all your software, especially Windows, Java, and Adobe products.</li>
<li>Password – Protect your system with a hard password. Note that your password should contain alphanumeric &amp; special characters with a long string length.</li>
</ul>
<p>The post <a rel="nofollow" href="https://www.osradar.com/zenis-ransomware-deletes-your-backup-and-encrypts-files/">Zenis Ransomware – Deletes Your Backup and Encrypts Files</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/zenis-ransomware-deletes-your-backup-and-encrypts-files/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Robots under Ransom – Threat of Future</title>
		<link>https://www.osradar.com/robots-under-ransom-threat-of-future/</link>
					<comments>https://www.osradar.com/robots-under-ransom-threat-of-future/#respond</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Sun, 11 Mar 2018 05:21:45 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[ransom]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=2122</guid>

					<description><![CDATA[<p>Ransom is one of the worst types of security issues all over the world. Recently, we also have observed the biggest ransomware attacks in the history of the computer. However, security researchers say that this isn’t the end of the nightmare; robots are the REAL threat to the world due to ransomware. As we all [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/robots-under-ransom-threat-of-future/">Robots under Ransom – Threat of Future</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Ransom is one of the worst types of security issues all over the world. Recently, we also have observed the biggest ransomware attacks in the history of the computer. However, security researchers say that this isn’t the end of the nightmare; robots are the REAL threat to the world due to ransomware.</p>
<p>As we all know, robots are specially built machines that work and function all by themselves or controlled by a human. In the future, we’re about to get robots capable of performing complex human tasks. Developers are working day and night to make that future into reality. What if those robots are hacked and asked for a ransom?</p>
<h3>The REAL threat</h3>
<p>Currently, almost all the robots in the field are working in factories. Those machines automatically work and produce a larger amount of products every single day. We all are the user of those products. In labs, there are also robots that are being developed to be more human.</p>
<p>Security researchers at IOActive discovered that they were able to infect robots with ransomware. As we all know how ransomware works, it encrypts the file(s) and asks for money to recover the data. There also could be a permanent hack that would allow a remote hacker to gain control of the machine and do something serious.</p>
<p>The researchers successfully injected their custom-built ransomware into NAO robot made by Softbank. They also added that the same attack will also work on the Pepper robot. Using the ransomware, the researchers enabled the robots to insult its audience and ask for Bitcoin to return back to normal. The researchers were also able to completely take control of the robots, allowing them to perform system changes or complete shutdown.</p>
<p><img loading="lazy" class="size-full wp-image-2125 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/03/robot-asking-for-ransomware.jpg" alt="" width="770" height="387" srcset="https://www.osradar.com/wp-content/uploads/2018/03/robot-asking-for-ransomware.jpg 770w, https://www.osradar.com/wp-content/uploads/2018/03/robot-asking-for-ransomware-300x151.jpg 300w, https://www.osradar.com/wp-content/uploads/2018/03/robot-asking-for-ransomware-768x386.jpg 768w, https://www.osradar.com/wp-content/uploads/2018/03/robot-asking-for-ransomware-696x350.jpg 696w" sizes="(max-width: 770px) 100vw, 770px" /></p>
<p>The threat sounds a bit creepy and for the small robots, such attack doesn’t pose any big threat. However, this proof-of-concept in real life can be serious. This discovery also focuses on the lower focus of robot security in the industry. Moreover, a hacked robot can act like a spy for the hacker.</p>
<p>According to Cesar Cerrudo, CTO at IOActive Labs said that such attack would infect any business and ask for money if the robot has to go back to work. For industries, every second count. Without the proper functioning, the robot will start causing a financial problem to the owner.</p>
<h3>What to do</h3>
<p>We don’t see robots every single day. However, they’re getting involved in lots of industries for the efficiency and more versatility. Robots are becoming mainstream. If the security isn’t ensured, this could be a problem.</p>
<p>Cerrudo said that one infected robot is easy to replace, but not dozens. Replacing and installing is also a matter of time for larger quantities, making the additional financial loss to the company.</p>
<p>The demonstration of proof-of-concept was conducted on security purpose and presented at the 2018 Kaspersky Security Analyst Summit. IOActive also mentioned that if robot security isn’t ensured, the future could be at stake.</p>
<p>IOActive informed Softbank about the flaw, but it’s not guaranteed if Softbank is going to fix it. In fact, it’s doubting whether Softbank can fix it with the current design of their robots, IOActive said.</p>
<p>We obviously don’t want to see “I, Robot” in reality, right? It’s in the hand of the developers to integrate proper security measures into their products’ system to prevent such situation. All we can do now is to stay protected with our own computers. <a href="https://www.osradar.com/how-to-secure-your-windows-10/">Learn how to secure your Windows 10 system</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/robots-under-ransom-threat-of-future/">Robots under Ransom – Threat of Future</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/robots-under-ransom-threat-of-future/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
