Poorly Coded Ransomware Doesn’t Decrypt Files after Ransom Payment

Here is the weekly roundup :

Dreaded Ransomware Surfaces Again as Cryptowall 4.0
A new variant of the notorious CryptoWall strain has now surfaced after security researchers discovered new features with the latest version of the ransomware now dubbed CryptoWall 4.0.

Poorly Coded Ransomware Doesn’t Decrypt Files after Ransom Payment
A poorly written malware strain of the ‘Power Worm’ ransomware family has been discovered to implement AES encryption to lock a victim’s files and carelessly proceeds to lose the key. This leads to a circumstance where a victim could ostensibly pay a ransom and yet, the files remain unrecoverable due to the loss of the encryption key.

How to Recover Files by Removing the CryptoLocker Ransomware
The CryptoLocker ransomware can cause quite a havoc in anyone's digital world. Luckily, There are a few ways to get your files back without having to pay the high ransom.

Worried about Falling Victim to a Ransomware Attack?
We can help! Let the LIFARS' Elite Incident Response Team help you handle the crisis and recover quickly. Our team has been trained to respond effectively and with military precision. Find out more.

2015: The Most Prolific Year for OS X Malware Ever
2015 is a year that will be remembered by Apple’s software and security engineers. This is the most prolific year for OS X Malware in history. There was five times more malware in 2015 than all the malware samples discovered during the previous five years. Combined.

Apple Boots Popular iOS App after Malware Found
A popular Instagram client – ‘InstaAgent’ was pulled from the Apple store by the tech giant after the application was found to ‘harvest’ account user names and passwords.

100 Million Android Devices at Risk Due to Baidu SDK Vulnerability
A software development kit (SDK) by popular Chinese search engine Baidu has a function that potentially grants backdoor-like access to an end-user’s device. This exploit could serve to compromise 100 million Android users.

Kaspersky & Law Enforcement Put an End to Ransomware Variant
Cybersecurity firm Kaspersky has announced that all malware authors behind the Coinvault and Bitcryptor ransomware are behind bars with the keys to decrypting infected victims’ computers now freely available for end-users.

Interesting Reading From Around the Web:

'Armada' Extortionist Hackers Bulldoze 'Secure' Email Services But Pay Some Bitcoin Back
The last four days have seen at least four private email providers taken offline by distributed denial of service (DDoS) attacks, where servers are overwhelmed with maliciously-generated traffic. All are being targeted by a strange crew called the Armada Collective.

Ransomware Now Gunning for Your Web Sites
One of the more common and destructive computer crimes to emerge over the past few years involves ransomware — malicious code that quietly scrambles all of the infected user’s documents and files with very strong encryption. Now it appears fraudsters are developing ransomware that does the same but for Web sites — essentially holding the site’s files, pages and images for ransom.

Scam Threatens 800 Million Apple Accounts
A new global phishing scam targeting the IDs, passwords and credit card information of potentially 800 million Apple ID accounts emerged, according to Clifton, N.J.-based cybersecurity firm Comodo Antispam Labs.

Upcoming Events:

The Next Generation of Incident Response

We are thrilled to present How to Prevent Personal & Corporate Hacking. A premiere panel featuring speakers with experience in the FBI, Secret Service, digital forensics, and more. Come learn how to protect yourself on both the personal and corporate level in our new media-rich era an earn 2 CPE credits.


Find Out More

On-Demand Webinar:

Best Practices for Cyber Security Incident Response (IR)

Whether you are a large or small company building an effective Incident Response (IR) may seem daunting in the wake of the ever increasing sophistication of threats. In this webinar we will cover the best practices of an effective Incident Response for cybersecurity.

Register Now

What’s in Your Incident Response Toolkit?

How do your tools match up to those used by investigators in high-profile breaches? Learn the best incident response tools for finding and sharing data at rest, in transit, and shared outside the organization from Ondrej Krehel of LIFARS, who has worked on the front lines of many headline-making security incidents.

Watch Webinar

Featured Content:

Cybersecurity While Traveling

The majority of us travel quite frequently, and yet we give little thought to how we keep our identity and data safe while doing so. This guide will provide you with some basic rules to follow when traveling that will significantly increase your security and privacy.

Free Download

Business Continuity Planning and Disaster Recovery

Disasters can hit your organization at any time. But, as this new ebook from SC Magazine reveals, there are tools and strategies to help get formal security plans and policies in place to best serve your enterprise when, during and after a data breach strikes.

Free Download

Connect with us

LinkedIn Twitter Facebook Google Website YouTube

LIFARS LLC, 244 Fifth Avenue, Suite 2035, New York, NY 10001 Copyright © 2016 LIFARS, LLC, All rights reserved.