Search Results for: encrypted files Blog Post How to Decrypt the Files Encrypted by the Hive Ransomware February 24, 2022 South Korean researchers published an academic paper that presents a method to decrypt the files encrypted by the Hive Ransomware... Knowledge Center A Detailed Analysis of the LockBit Ransomware February 24, 2022 LockBit 2.0 ransomware is one of the most active families in the wild and pretends to implement the fastest encryption... Knowledge Center A Deep Dive into The Grief Ransomware’s Capabilities January 11, 2022 Grief ransomware is the successor of the DoppelPaymer ransomware, which emerged from the BitPaymer ransomware. Grief is deployed in an... Knowledge Center Makop Ransomware August 27, 2021 Makop ransomware encrypts user’s files using the AES256 algorithm and advises the victims to contact the attackers via Tox (P2P instant-messaging... Blog Post A brief analysis of the last version of Conti ransomware September 27, 2021 Conti ransomware has been sold as a RaaS (Ransomware as a Service) in underground forums and it’s known that it... Blog Post The Lorenz Ransomware Gang Demand High Ransoms June 25, 2021 The Lorenz Gang Over the past few months, the Lorenz ransomware threat (the encryptor is believed to be the same... Blog Post Roger Ransomware October 1, 2020 Roger ransomware belongs to the CrySIS/Dharma family. It got its name out of the .ROGER extension it usually adds to... Blog Post Microsoft Reveals Critical Bugs Allowing Takeover of NETGEAR Routers July 21, 2021 Microsoft has revealed critical bugs regarding NETGEAR routers that could cause data leaks and system compromise. More particularly, researchers from... Blog Post FBI Flash Alert Warns on OnePercent Group Ransomware Attacks September 14, 2021 In coordination with DHS-CISA, the FBI recently published a flash alert warning the public against the OnePercent Group ransomware gang... Knowledge Center Snatch Ransomware – Malware Analysis Case Study July 29, 2020 Overview. During last month LIFARS DFIR Team encountered various variants of Snatch Ransomware. This ransomware is known for its capability... Blog Post Ransomware Gangs Have a New Trick Up their Sleeves: Double-Encrypting Your Data June 16, 2021 Ransomware that double-encrypts your data is an emerging trend among ransomware gangs looking to score big. As we learn everywhere,... Blog Post Ryuk Ransomware Removal Guide October 29, 2020 LIFARS Incident Response Team (LISIRT) is observing a heavy increase in Ryuk Ransomware activity, mainly in the healthcare sector. It... Blog Post 2021 Has The Emergence Of Babuk Locker Ransomware January 11, 2021 Babuk Locker is a new form of ransomware that just emerged in 2021. This version of ransomware is like other... Blog Post Zero-days in Accellion file transfer app used for data theft March 4, 2021 Back in December 2020, a software vendor Accellion informed about an actively exploited zero-day vulnerability in its File Transfer Appliance... Blog Post Should I Pay the Ransom? How to Negotiate with Attackers? May 18, 2021 Should I pay the ransom? In the age of cyber warfare, the question is too frequent to ask; however, it...
Blog Post How to Decrypt the Files Encrypted by the Hive Ransomware February 24, 2022 South Korean researchers published an academic paper that presents a method to decrypt the files encrypted by the Hive Ransomware...
Knowledge Center A Detailed Analysis of the LockBit Ransomware February 24, 2022 LockBit 2.0 ransomware is one of the most active families in the wild and pretends to implement the fastest encryption...
Knowledge Center A Deep Dive into The Grief Ransomware’s Capabilities January 11, 2022 Grief ransomware is the successor of the DoppelPaymer ransomware, which emerged from the BitPaymer ransomware. Grief is deployed in an...
Knowledge Center Makop Ransomware August 27, 2021 Makop ransomware encrypts user’s files using the AES256 algorithm and advises the victims to contact the attackers via Tox (P2P instant-messaging...
Blog Post A brief analysis of the last version of Conti ransomware September 27, 2021 Conti ransomware has been sold as a RaaS (Ransomware as a Service) in underground forums and it’s known that it...
Blog Post The Lorenz Ransomware Gang Demand High Ransoms June 25, 2021 The Lorenz Gang Over the past few months, the Lorenz ransomware threat (the encryptor is believed to be the same...
Blog Post Roger Ransomware October 1, 2020 Roger ransomware belongs to the CrySIS/Dharma family. It got its name out of the .ROGER extension it usually adds to...
Blog Post Microsoft Reveals Critical Bugs Allowing Takeover of NETGEAR Routers July 21, 2021 Microsoft has revealed critical bugs regarding NETGEAR routers that could cause data leaks and system compromise. More particularly, researchers from...
Blog Post FBI Flash Alert Warns on OnePercent Group Ransomware Attacks September 14, 2021 In coordination with DHS-CISA, the FBI recently published a flash alert warning the public against the OnePercent Group ransomware gang...
Knowledge Center Snatch Ransomware – Malware Analysis Case Study July 29, 2020 Overview. During last month LIFARS DFIR Team encountered various variants of Snatch Ransomware. This ransomware is known for its capability...
Blog Post Ransomware Gangs Have a New Trick Up their Sleeves: Double-Encrypting Your Data June 16, 2021 Ransomware that double-encrypts your data is an emerging trend among ransomware gangs looking to score big. As we learn everywhere,...
Blog Post Ryuk Ransomware Removal Guide October 29, 2020 LIFARS Incident Response Team (LISIRT) is observing a heavy increase in Ryuk Ransomware activity, mainly in the healthcare sector. It...
Blog Post 2021 Has The Emergence Of Babuk Locker Ransomware January 11, 2021 Babuk Locker is a new form of ransomware that just emerged in 2021. This version of ransomware is like other...
Blog Post Zero-days in Accellion file transfer app used for data theft March 4, 2021 Back in December 2020, a software vendor Accellion informed about an actively exploited zero-day vulnerability in its File Transfer Appliance...
Blog Post Should I Pay the Ransom? How to Negotiate with Attackers? May 18, 2021 Should I pay the ransom? In the age of cyber warfare, the question is too frequent to ask; however, it...