Search Results for: ransomware investigations Blog Post FBI’s investigation accidentally revealed the HelloKitty ransomware gang operates out of Ukraine January 21, 2022 In the never-ending fight against cybercrime, it’s rare for law enforcement to be the ones to strike it lucky. It’s... Blog Post How to Decrypt the Files Encrypted by the Hive Ransomware February 24, 2022 South Korean researchers published an academic paper that presents a method to decrypt the files encrypted by the Hive Ransomware... Knowledge Center Unpacking of Egregor Ransomware – Malware Analysis January 21, 2021 Executive Summary In this case study, we describe malware analysis and unpacking of a newly emerged ransomware Egregor. It is... Knowledge Center DearCry Ransomware Malware Analysis and Reverse Engineering April 8, 2021 The goal of this paper is to provide a deep analysis of DearCry ransomware and demonstrate some techniques of malware... Blog Post Conti Ransomware Gang Announces Support of Russia – Ukrainian Member Leaks Chats February 28, 2022 To no one’s surprise, the infamous Conti ransomware gang, known for having close ties with Russian intelligence, announced that it... Blog Post Defend against Ransomware: Controlled folder access January 27, 2020 Ransomware attacks have become the main challenge and threat against organizations, costing them hundreds of thousands or even millions of... Blog Post Phishing Awareness Training Effective Only for a Few Months October 12, 2020 In the majority of cyber breaches, phishing attacks are the root cause. Phishing awareness training sensitizes a company’s employees to... Blog Post NY Metro InfraGard Emergency Update: Healthcare Cyber Attacks November 25, 2020 About This Event The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation(FBI), and the Department of Health... Blog Post Fake Windows update (Hidden Ransomware) May 31, 2020 Ransomware has developed into a ‘criminal malware of choice’ in recent times, especially when it comes to hitting local government... Blog Post Ransomware as a service (RaaS): What is it and How Does It Work? May 23, 2020 Ransomware, dating back to 1989, is a variety of malware that attempts to extort money from a computer user by... Blog Post Cognizant hacked by Maze Ransomware Attack May 7, 2020 During the Covid-19 pandemic, Cognizant, the technology solution corp was hacked by Maze group causing huge service disruptions for the... Blog Post What You Need to Know About Maze Ransomware Attacks May 3, 2020 Destructive ransomware attacks against large organizations have always been headlines, and unfortunately, they are becoming more common. For example, on... Knowledge Center Red Teaming Case Study August 6, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts red team engagements and penetration tests evaluating whether... Knowledge Center APT41 – A spy who steals or a thief who spies April 21, 2020 APT41 – The Spy Who Encrypted Me. This case study is based on our most recent investigation into one of... Knowledge Center Windows Memory Forensics Technical Guide Part 2 June 8, 2020 Introduction to Structured Analysis with Volatility. Investigative Process Steps. Windows Processes. Structured Analysis and Investigative Process After a short introduction...
Blog Post FBI’s investigation accidentally revealed the HelloKitty ransomware gang operates out of Ukraine January 21, 2022 In the never-ending fight against cybercrime, it’s rare for law enforcement to be the ones to strike it lucky. It’s...
Blog Post How to Decrypt the Files Encrypted by the Hive Ransomware February 24, 2022 South Korean researchers published an academic paper that presents a method to decrypt the files encrypted by the Hive Ransomware...
Knowledge Center Unpacking of Egregor Ransomware – Malware Analysis January 21, 2021 Executive Summary In this case study, we describe malware analysis and unpacking of a newly emerged ransomware Egregor. It is...
Knowledge Center DearCry Ransomware Malware Analysis and Reverse Engineering April 8, 2021 The goal of this paper is to provide a deep analysis of DearCry ransomware and demonstrate some techniques of malware...
Blog Post Conti Ransomware Gang Announces Support of Russia – Ukrainian Member Leaks Chats February 28, 2022 To no one’s surprise, the infamous Conti ransomware gang, known for having close ties with Russian intelligence, announced that it...
Blog Post Defend against Ransomware: Controlled folder access January 27, 2020 Ransomware attacks have become the main challenge and threat against organizations, costing them hundreds of thousands or even millions of...
Blog Post Phishing Awareness Training Effective Only for a Few Months October 12, 2020 In the majority of cyber breaches, phishing attacks are the root cause. Phishing awareness training sensitizes a company’s employees to...
Blog Post NY Metro InfraGard Emergency Update: Healthcare Cyber Attacks November 25, 2020 About This Event The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation(FBI), and the Department of Health...
Blog Post Fake Windows update (Hidden Ransomware) May 31, 2020 Ransomware has developed into a ‘criminal malware of choice’ in recent times, especially when it comes to hitting local government...
Blog Post Ransomware as a service (RaaS): What is it and How Does It Work? May 23, 2020 Ransomware, dating back to 1989, is a variety of malware that attempts to extort money from a computer user by...
Blog Post Cognizant hacked by Maze Ransomware Attack May 7, 2020 During the Covid-19 pandemic, Cognizant, the technology solution corp was hacked by Maze group causing huge service disruptions for the...
Blog Post What You Need to Know About Maze Ransomware Attacks May 3, 2020 Destructive ransomware attacks against large organizations have always been headlines, and unfortunately, they are becoming more common. For example, on...
Knowledge Center Red Teaming Case Study August 6, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts red team engagements and penetration tests evaluating whether...
Knowledge Center APT41 – A spy who steals or a thief who spies April 21, 2020 APT41 – The Spy Who Encrypted Me. This case study is based on our most recent investigation into one of...
Knowledge Center Windows Memory Forensics Technical Guide Part 2 June 8, 2020 Introduction to Structured Analysis with Volatility. Investigative Process Steps. Windows Processes. Structured Analysis and Investigative Process After a short introduction...