<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>bitcoin Archives - Datarecovery.com</title>
	<atom:link href="https://datarecovery.com/tag/bitcoin/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description></description>
	<lastBuildDate>Thu, 13 May 2021 10:59:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>The 6 Most Common Places Your Lost Bitcoin Wallet Is Hiding (and How to Recover It)</title>
		<link>https://datarecovery.com/rd/the-6-most-common-places-your-lost-bitcoin-wallet-is-hiding-and-how-to-recover-it/</link>
					<comments>https://datarecovery.com/rd/the-6-most-common-places-your-lost-bitcoin-wallet-is-hiding-and-how-to-recover-it/#respond</comments>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Fri, 02 Apr 2021 15:12:07 +0000</pubDate>
				<category><![CDATA[Cryptocurrency]]></category>
		<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?p=6521</guid>

					<description><![CDATA[<p>While Bitcoin began as a very niche, very esoteric cryptocurrency, it has since grown into something much more mainstream in the past decade. With the price of Bitcoin topping 61 thousand dollars in mid-March and hovering around the 55 thousand...</p>
<p>The post <a href="https://datarecovery.com/rd/the-6-most-common-places-your-lost-bitcoin-wallet-is-hiding-and-how-to-recover-it/">The 6 Most Common Places Your Lost Bitcoin Wallet Is Hiding (and How to Recover It)</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="aligncenter wp-image-6522 size-large" src="https://datarecovery.com/wp-content/uploads/2021/04/bitcoin-wallet-1280-986x1024.png" alt="Bitcoin Wallet" width="986" height="1024" srcset="https://datarecovery.com/wp-content/uploads/2021/04/bitcoin-wallet-1280-986x1024.png 986w, https://datarecovery.com/wp-content/uploads/2021/04/bitcoin-wallet-1280-289x300.png 289w, https://datarecovery.com/wp-content/uploads/2021/04/bitcoin-wallet-1280-768x797.png 768w, https://datarecovery.com/wp-content/uploads/2021/04/bitcoin-wallet-1280.png 1233w" sizes="(max-width: 986px) 100vw, 986px" /></p>
<p>While Bitcoin began as a very niche, very esoteric cryptocurrency, it has since grown into something much more mainstream in the past decade. With the price of Bitcoin topping 61 thousand dollars in mid-March and hovering around the 55 thousand dollar mark as April approaches, it’s well worth taking the time to ask yourself if you might have a Bitcoin wallet stored somewhere. That&#8217;s more than 20 thousand dollars higher than it was when we wrote <a href="https://datarecovery.com/2021/01/bitcoin-price-is-higher-than-ever-heres-what-to-do-if-youve-lost-your-bitcoin-wallet-password/">our previous Bitcoin-related article</a> in January. Considering the fact that the ever-popular cryptocurrency has been around for over a decade now, it’s very possible — and actually quite a common occurrence — to see someone who invested or experimented with the cryptocurrency when it first began to catch on around 2010 and completely forgot about it until now. Naturally, the hunt for a lost Bitcoin wallet is easier said than done.</p>
<h2>What Is a Bitcoin Wallet?</h2>
<p>Before getting into the places your Bitcoin wallet might be hiding, it’s worth defining what exactly a Bitcoin wallet actually is. (Believe it or not, a better understanding of what Bitcoin wallets are might actually help you to uncover your own missing wallet.)</p>
<p>On the most basic level, a Bitcoin wallet is not a tangible thing. It’s not the same as the object you keep in your back pocket or your bag — it’s a program, a digital thing instead of a physical one. However, the purpose remains more or less the same: to protect your currency. Instead of cash and cards, though, the Bitcoin wallet protects the secure, private key (or keys) that are then used to access your Bitcoin addresses and make transactions.</p>
<p>Bitcoin wallets, most frequently, are stored on a desktop computer, on a mobile app, in the cloud, or on a piece of hardware. They don’t actually store Bitcoins themselves, but rather the keys that link you to the address of your cryptocurrency. Without that key, which is actually a secret number and not a tiny piece of metal, you won’t be able to access your Bitcoins.</p>
<h2>Where Is Your Bitcoin Wallet Hiding?</h2>
<p>It might seem counterintuitive to have to jump through so many hoops in order to access your Bitcoin keys, but the rigamarole is well worth it — especially when you take into consideration the sheer amount of hackers and cybercriminals who would love to get their hands on some long-untouched Bitcoin. When you can’t locate your Bitcoin wallet, it’s natural to feel sort of panicked. However, there’s no need to worry: If your Bitcoin wallet is out there, then it’s almost definitely capable of being located. You just have to know where to look.</p>
<h3>Old Tape Drives</h3>
<p>If you’ve ever utilized tape drive storage in the past, then it’s worth pulling those old tape drives out and checking them for your missing or forgotten Bitcoin wallet. Being a form of cold storage, meaning that tape drives store information without the use of the internet, tape drives are a sensible and very possible location for Bitcoin wallets.</p>
<h3>Former Hard Drives</h3>
<p>As time goes on, it’s only natural that we will upgrade our computers again and again. With technological advances coinciding with the incessant crawl of obsolescence, getting a new computer or a new hard drive is just a part of life. With this upgrade comes the possibility that old and important files and programs might be left behind on the former hard drives. Considering Bitcoin originated all the way back in 2009, there are a lot of potential hard drive upgrades that could have happened between then and now. As such, looking back through old hard drives might uncover your missing Bitcoin wallet. Not to mention, sometimes drives simply break down and need to be replaced — If you’ve held onto those broken drives, you might as well check them for any Bitcoin keys.</p>
<h3>Bitcoin Exchanges</h3>
<p>While there’s no one set way to buy and trade Bitcoin, Bitcoin exchanges continue to be one of the most popular ways to do so. By buying a set number of Bitcoin and trading it for the equivalency in other currencies, many see a way to increase their total investment through a version of forex trading. However, if you’ve lost your password to your Bitcoin exchange, then it would not be possible for you to do any buying and selling at all. If you suspect this may be the case, then it’s worth your while to recover your password as soon as you can.</p>
<h3>Portable USB Drives</h3>
<p>Also known as flash drives or external hard drives, portable USB drives make for a convenient and easy way to save your important documents and files on one device and transfer them to another. However, with recent updates to modern laptops, some have found these flash drives to be outdated and useless now — especially on computers that don’t even have a compatible slot for them, like the current Macbook design. However, it’s very possible that your Bitcoin wallet could be stored on an old portable USB drive that you no longer use. Through the use of an adapter if necessary, consider plugging the drive into your computer and searching through the drive for your Bitcoin wallet.</p>
<h3>Writable CD/DVD-ROMs</h3>
<p>Similar to portable USB drives, CD and DVD-ROM discs were quite useful for a while — That is, until laptops began phasing out disc drives in favor of other (more modern) technology. Unfortunately, this means that many documents, files, photos, and videos stored on these discs are no longer as easily accessible as they once were. If your laptop or desktop no longer has a disc drive, consider investing in an external disc drive to search through for your Bitcoin wallet.</p>
<h3>Misunderstood Bitcoin Wallets</h3>
<p>Occasionally, a missing Bitcoin wallet isn’t even missing at all — It’s just misunderstood. This is no fault of your own, of course. Cryptocurrency is still a very new, very innovative thing and it’s okay to feel a little lost by it. As it turns out, feeling lost can also result in actually losing things (in this instance, Bitcoin wallets). No matter if your Bitcoin wallet is in the form of a BIP39 mnemonic phrase, a BIP38 paper wallet, or some other unfamiliar form, consider reaching out to a Bitcoin expert for further help understanding.</p>
<h2>What if I Can&#8217;t Find My Bitcoin Wallet?</h2>
<p>At the end of the day, some of these places are just too tricky (and too pricey) for you to be able to search through them yourself. From tape drives to USB drives and everything in between, consider sending your old devices to the experts at Datarecovery.com. We take pride in our ability to locate whatever you might have lost, whether it be something as urgent as a Bitcoin wallet or something as casual as an old digital photo album. Contact us today to get started.</p>
<p>The post <a href="https://datarecovery.com/rd/the-6-most-common-places-your-lost-bitcoin-wallet-is-hiding-and-how-to-recover-it/">The 6 Most Common Places Your Lost Bitcoin Wallet Is Hiding (and How to Recover It)</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://datarecovery.com/rd/the-6-most-common-places-your-lost-bitcoin-wallet-is-hiding-and-how-to-recover-it/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>NFTs Explained: What Are They, and How Might They Shape the Future of Cryptocurrency?</title>
		<link>https://datarecovery.com/2021/01/nfts-explained-shaping-the-future-of-blockchains-and-cryptocurrency/</link>
					<comments>https://datarecovery.com/2021/01/nfts-explained-shaping-the-future-of-blockchains-and-cryptocurrency/#respond</comments>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Mon, 11 Jan 2021 19:25:09 +0000</pubDate>
				<category><![CDATA[Cryptocurrency]]></category>
		<category><![CDATA[Investing and the Stock Market]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[NFT]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?p=6530</guid>

					<description><![CDATA[<p>While cryptocurrency has been around for over a decade now, the concept of an intangible digital asset with an extremely tangible price tag has really come to the forefront of the general public’s mind with the great Bitcoin boom of...</p>
<p>The post <a href="https://datarecovery.com/2021/01/nfts-explained-shaping-the-future-of-blockchains-and-cryptocurrency/">NFTs Explained: What Are They, and How Might They Shape the Future of Cryptocurrency?</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>While cryptocurrency has been around for over a decade now, the concept of an intangible digital asset with an extremely tangible price tag has really come to the forefront of the general public’s mind with the great Bitcoin boom of 2021. While most of the conversation has revolved around that extremely enticing 50-thousand-dollar Bitcoin price tag, there are some other digital assets making plenty of noise on the sidelines — namely NFTs, many of which are selling for millions of dollars despite the big question mark surrounding them.</p>
<h2>What Is an NFT?</h2>
<p><img loading="lazy" decoding="async" class="wp-image-6532 size-medium alignright" src="https://datarecovery.com/wp-content/uploads/2021/04/Beeple-Everydays-The-First-5000-Days-600x600-1-300x300.jpg" alt="Beeple - Everydays The First 5000 Days" width="300" height="300" srcset="https://datarecovery.com/wp-content/uploads/2021/04/Beeple-Everydays-The-First-5000-Days-600x600-1-300x300.jpg 300w, https://datarecovery.com/wp-content/uploads/2021/04/Beeple-Everydays-The-First-5000-Days-600x600-1-234x234.jpg 234w, https://datarecovery.com/wp-content/uploads/2021/04/Beeple-Everydays-The-First-5000-Days-600x600-1-45x45.jpg 45w, https://datarecovery.com/wp-content/uploads/2021/04/Beeple-Everydays-The-First-5000-Days-600x600-1.jpg 600w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>In March of this year, digital artist Mike Winkelmann (more commonly known as Beeple) sold a JPG for 69.3 million dollars. Not only is this one of the highest price tags for a piece of art ever sold, but the enormous 21,069 pixel x 21,069 pixel collage — titled EVERYDAYS: THE FIRST 5000 DAYS — is also the most expensive NFT in the very brief history of the digital asset. But… what exactly <i>is </i>an NFT?</p>
<p>The short answer is that NFT stands for non-fungible token. This doesn’t make it any clearer why someone would pay almost 70 million dollars for what is essentially a digital file when a person could seemingly just save the image to their computer for free, though. You see, the key to understanding NFTs lies in those first two letters: NF. Non-fungible. This means that the token (the T of NFT) cannot be replaced. It’s one of a kind. Compare this to currency in general terms (either dollars or cryptocurrency like Bitcoin). Currency is fungible. There is effectively no difference in regard to value between one dollar and another dollar, or between one Bitcoin and another Bitcoin. They are interchangeable in their use.</p>
<p>This still leaves the question of ownership, though. How can a person truly own an image when anyone could come along and simply save the image to their computer and say they own it? It’s a valid question, and the answer still might not satisfy you: Think of the Mona Lisa. Anyone can print out a picture of Leonardo da Vinci’s most famous work, but it doesn’t change the fact that the one and only original remains on the wall at the Louvre Museum in Paris, France. The same goes for NFTs. Every printed or forged copy of the Mona Lisa will have distinctions in comparison to the original, but an NFT has a digital makeup that identities it as one of a kind. It’s all about trying to bring verifiable ownership to crypto, in other words — but it’s more akin to a Certificate of Authenticity, really.</p>
<h2>Why Are NFTs So Popular?</h2>
<p>While NFTs have had the most success in the art world, they can really be any digital thing, from social media posts to albums to sketches to documents and anything in between. For this reason, notable figures from all corners of the pop culture pantheon have come out of the woodworks to dip their toes in NFTs. Actors like William Shatner, musicians like Weezer, plenty of social media influencers, and countless others — like the creator of ancient internet meme Nyan Cat — have done their part to wheel and deal NFTs. All of these big names have essentially worked in tandem with one another to make this novel crypto asset blow up.</p>
<p>Not to mention, NFTs have been making millions in the past month or so — and not just Beeple’s EVERYDAYS: THE FIRST 5000 DAYS. All sorts of other artists have made anywhere from one to ten million dollars on their own respective NFTs. Their success with NFTs combined with the almost meme-ification of the crypto asset by verified celebrities and other social media users has created an unprecedented amount of buzz.</p>
<h2>Are NFTs Worth It?</h2>
<p><img loading="lazy" decoding="async" class="size-full wp-image-6537 alignright" src="https://datarecovery.com/wp-content/uploads/2021/04/ethereum-cryptocoin-240x183-1.jpg" alt="ethereum cryptocoin" width="240" height="183" />To answer the question of whether or not NFTs are worth it, let’s get into how they actually work on a technical level. See, the majority of NFTs are a part of the Ethereum blockchain. While Ethereum itself is a cryptocurrency, it’s the cryptocurrency’s blockchain that holds the large chunk of the world’s NFTs. For this reason, other blockchains are free to implement their own version of NFTs if they pleased — Which potentially raises a red flag for the future of NFTs themselves, should another blockchain choose to do their own take on them.</p>
<p>Beyond this, while NFTs promote ownership, the artist often still retains the copyright and reproduction rights — meaning that your one-of-a-kind non-fungible token might not be so non-fungible as you initially thought it was. If an artist’s NFT doesn’t sell for the high price they expected it to sell for, then there’s nothing stopping them from taking another crack at it and creating another token. For this reason, NFTs are less like proof of ownership and more like proof of commemoration.</p>
<p>While these two factors definitely make NFTs sound riskier for buyers, they’re big positives for sellers. Not only do they give artists the opportunity to sell their work for much more than they ever would have had the chance to otherwise, NFTs optionally come equipped with a feature that pays the artist a percentage every time the token is sold or traded.</p>
<h2>The Future of NFTs</h2>
<p>Wherever you fall in the great NFT debate, the future of NFTs remains pretty murky. Five, ten, 100 years from now, who’s to say how much these non-fungible tokens will be worth? Not to mention, there’s always the possibility that the NFT owner’s crypto wallet could be lost or stolen, that the image quality could decline, that the artist could create ten more copies that devalue your token, and countless other risks that make these crypto assets far more risky than, say, Bitcoin.</p>
<p>If anything, the popularity of NFTs doesn’t suggest that they will become the future of cryptocurrency, but that many other kinds of crypto assets are sure to emerge in the coming years to compete with their success. Given Bitcoin’s immense and ever-increasing price tag, it’s clear that cryptocurrency isn’t going anywhere. Whether or not NFTs will blow up in a good way or in a bad way remains to be seen, but this much is clear: they surely won’t be the last of their kind.</p>
<p>The post <a href="https://datarecovery.com/2021/01/nfts-explained-shaping-the-future-of-blockchains-and-cryptocurrency/">NFTs Explained: What Are They, and How Might They Shape the Future of Cryptocurrency?</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://datarecovery.com/2021/01/nfts-explained-shaping-the-future-of-blockchains-and-cryptocurrency/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Why Ransomware Criminals are Moving Away from Bitcoin</title>
		<link>https://datarecovery.com/rd/ransomware-criminals-moving-away-bitcoin/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Fri, 29 Jun 2018 21:37:01 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5818</guid>

					<description><![CDATA[<p>Bitcoin used to be the preferred payment method of cybercriminals. Last year, <a href="https://datarecovery.com/rd/4-game-changing-ransomware-attacks">we reported that the hackers behind the WannaCry ransomware</a> infected PCs worldwide, and demanded payment in the form of Bitcoin from their victims. Hackers asked for Bitcoin because...</p>
<p>The post <a href="https://datarecovery.com/rd/ransomware-criminals-moving-away-bitcoin/">Why Ransomware Criminals are Moving Away from Bitcoin</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="wp-image-5819 size-medium alignright" src="https://datarecovery.com/wp-content/uploads/2018/06/hacker-2300772_1920-300x200.jpg" alt="darkweb hacker image" width="300" height="200" srcset="https://datarecovery.com/wp-content/uploads/2018/06/hacker-2300772_1920-300x200.jpg 300w, https://datarecovery.com/wp-content/uploads/2018/06/hacker-2300772_1920-1024x683.jpg 1024w, https://datarecovery.com/wp-content/uploads/2018/06/hacker-2300772_1920-768x512.jpg 768w, https://datarecovery.com/wp-content/uploads/2018/06/hacker-2300772_1920-1536x1024.jpg 1536w, https://datarecovery.com/wp-content/uploads/2018/06/hacker-2300772_1920.jpg 1920w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>Bitcoin used to be the preferred payment method of cybercriminals. Last year, <a href="https://datarecovery.com/rd/4-game-changing-ransomware-attacks">we reported that the hackers behind the WannaCry ransomware</a> infected PCs worldwide, and demanded payment in the form of Bitcoin from their victims. Hackers asked for Bitcoin because the cryptocurrency&#8217;s transactions are harder to trace to individuals compared to traditional bank transfers.</p>
<p>Some European businesses started to purchase Bitcoin in 2017 in order to prepare themselves for future ransomware demands. Cyber criminals, meanwhile, saw the value of Bitcoin skyrocket, which made the cryptocurrency a target for high-profile cyber theft.</p>
<p>Despite Bitcoin’s continuing popularity and expensive value, several news reports are stating that ransomware criminals are now asking for a different payment method.</p>
<p>While Bitcoin remains a highly popular cryptocurrency among people who deal in the dark web, its high-profile status is giving criminals some problems. <a href="https://www.zdnet.com/article/new-ransomware-headache-as-crooks-dump-bitcoin-for-rival-cryptocurrencies">ZDnet puts the blame on the asset&#8217;s hyper volatility</a> that sometimes jeopardizes criminal operations. A crash doesn&#8217;t only affect investors who have diversified their portfolio with cryptocurrencies, but also criminals who need to keep adjusting their ransom based on the current prices of Bitcoin.</p>
<p>Before 2017 ended, Bitcoin reached an all-time high of $20,000. However, it slid sharply at the start of 2018, and settled at 50% of its December 2017 prices. In June, <a href="https://www.nadex.com/market-news/2018/06/12/news-continues-rock-bitcoin-and-create-volatility">Nadex reported that cryptocurrency markets are being rocked by volatility</a> almost every day. Bitcoin moved 13% lower, and even experienced a $1,000 drop in one trading day. Like any other asset, Bitcoin&#8217;s prices are affected by fundamental factors that affect the economy as a whole. Hacked online exchanges, the strengthening of regulated currencies, and current investor sentiment towards cryptocurrency markets are just some examples of what can affect the price of Bitcoin.</p>
<p>In the same article by ZDNet, it was mentioned that criminals are moving towards more stable forms of cryptocurrency like Monero, Zcash, and Ethereum. With the aforementioned 3 cryptocurrencies, criminals won&#8217;t have to keep adjusting their ransom every time Bitcoin’s prices crash.</p>
<h2>Bad news for altcoins</h2>
<p>The shift to other cryptocurrencies is gaining traction within the dark web. If more cybercriminals move towards other forms of digital funds, it will create problems for investors who have decided to stay away from Bitcoin because of its volatility. Hackers who switch to other cryptocurrencies will disrupt the trust of investors, and make altcoins more volatile. Apart from that, the mass switch by ransomware criminals to other cryptocurrencies will also make it harder for authorities to catch criminals, because they will be investigating multiple cryptocurrencies instead of just Bitcoin. Some new cryptocurrencies are designed to provide almost absolute anonymity to the integrity of the transactions and users, making investigations into cyber-crime money laundering next to impossible.</p>
<p>&#8220;We&#8217;ll see a progressive shift in 2018 towards criminal use of cryptocurrencies other than Bitcoin, making it generally more challenging for law enforcement to counter,&#8221; <a href="https://twitter.com/rwainwright67/status/948169562910052352">warned the Executive Director of Europol Rob Wainwright in a Tweet</a>.</p>
<p>Despite the switch to other cryptocurrencies, many criminals will also continue to use Bitcoin due to its popularity. With more people and companies using it for everyday transactions, there is a higher chance of receiving the ransom.</p>
<p>&#8220;We must remember that when forcing ransom payment, Bitcoin is still the cryptocurrency of choice given its wide availability and use&#8221; <a href="https://www.scmagazineuk.com/why-are-cyber-criminals-dumping-bitcoin/article/734738/">said Thycotic&#8217;s Chief Security Scientist Joseph Carson</a>. “It is when cyber-criminals are moving money around to pay other cyber-criminals or to purchase new toys they will use an alternative cryptocurrency to keep a low profile.”</p>
<p>Did you have your data stolen by ransomware criminals? <a href="https://datarecovery.com/services/">Here on Datarecovery.com we provide fast and affordable solutions</a> to your stolen files. Call us at 800-237-4200 so we can help retrieve what&#8217;s yours.</p>
<p>The post <a href="https://datarecovery.com/rd/ransomware-criminals-moving-away-bitcoin/">Why Ransomware Criminals are Moving Away from Bitcoin</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How Siacoin Could Change Data Storage</title>
		<link>https://datarecovery.com/rd/siacoin-change-data-storage/</link>
		
		<dc:creator><![CDATA[Ben Carmitchel]]></dc:creator>
		<pubDate>Tue, 24 Apr 2018 18:06:56 +0000</pubDate>
				<category><![CDATA[Storage Industry]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5781</guid>

					<description><![CDATA[<p>The blockchain — the ledger technology powering every major cryptocurrency from Bitcoin to Ether — is unquestionably one of the most interesting innovations of the last decade. However, while Bitcoin revolutionized digital currency, many believe that the blockchain is destined...</p>
<p>The post <a href="https://datarecovery.com/rd/siacoin-change-data-storage/">How Siacoin Could Change Data Storage</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p dir="ltr">The blockchain — the ledger technology powering every major cryptocurrency from Bitcoin to Ether — is unquestionably one of the most interesting innovations of the last decade. However, while Bitcoin revolutionized digital currency, many believe that the blockchain is destined for bigger and better things.</p>
<p><b> </b></p>
<p dir="ltr">Enter Sia, a decentralized cloud storage platform that hopes to leverage the power of the blockchain to rival mainstream services like Amazon Web Services, Dropbox, and Google Drive. It&#8217;s one of the most exciting uses of the technology, and it has the potential to change the way that we store and access data.</p>
<h2 dir="ltr">In simple terms, here&#8217;s how Sia (and Siacoin) works.</h2>
<p dir="ltr">A renter purchases Siacoin, then exchanges them to buy a certain amount of storage space on the blockchain.<br />
<br class="m_-2604452896931295090gmail-kix-line-break" />The renter uploads files, which the service divides into 30 segments using Reed-Solomon erasure coding. The files are stored with a high level of redundancy, and can be reconstructed with any 10 segments. In other words, if 20 of the host computers go down, the files are still accessible.</p>
<p><b><img loading="lazy" decoding="async" class="alignright wp-image-5784 " title="Sia coin icon" src="https://datarecovery.com/wp-content/uploads/2018/04/3211-234x234.png" alt="Sia coin icon" width="211" height="211" srcset="https://datarecovery.com/wp-content/uploads/2018/04/3211-234x234.png 234w, https://datarecovery.com/wp-content/uploads/2018/04/3211-300x300.png 300w, https://datarecovery.com/wp-content/uploads/2018/04/3211-45x45.png 45w, https://datarecovery.com/wp-content/uploads/2018/04/3211.png 400w" sizes="auto, (max-width: 211px) 100vw, 211px" /></b></p>
<p dir="ltr">Sia encrypts each file segment with the Twofish cipher (an important point of differentiation, since many major cloud services don&#8217;t encrypt files by default). The renter and the hosts enter into a smart contract, enforced by the Sia network; renters purchase storage with Siacoin, while hosts deposit Siacoin as collateral for renting out unused space on their storage media (typically hard drives). That ensures that hosts don&#8217;t set up contracts and immediately drop offline — they&#8217;d lose currency by attempting to game the network. <br class="m_-2604452896931295090gmail-kix-line-break" /><br class="m_-2604452896931295090gmail-kix-line-break" />The host only receives payment after submitting storage proofs, which Sia stores permanently on the blockchain. The contracts typically last for 90 days. When hosts drop off the network, Sia performs file repairs, ensuring that 30 hosts are storing the file segments at most times. <br class="m_-2604452896931295090gmail-kix-line-break" /><br class="m_-2604452896931295090gmail-kix-line-break" />Interestingly, payment transactions don&#8217;t occur on the blockchain; they occur through specialized payment channels, which help to keep Sia&#8217;s storage tech efficient.  <br class="m_-2604452896931295090gmail-kix-line-break" /><br class="m_-2604452896931295090gmail-kix-line-break" /></p>
<h2 dir="ltr">The advantage of Sia: True decentralization.</h2>
<p dir="ltr">Currently, Sia is geared towards developers, enterprise-level businesses, and other users that require a need to maintain a large amount of reliable storage at a low cost. It&#8217;s not geared towards personal computer users — yet. In our opinion, Sia will need to drastically improve its core client (SiaUI) in order to appeal to typical consumers.</p>
<p dir="ltr">However, it&#8217;s difficult to overstate the technology&#8217;s potential. Sia could change data storage forever by providing true decentralization, eliminating the points of failure that can cause serious issues for mission-critical applications. One example: In 2017, <a href="https://www.mprnews.org/story/2017/02/28/amazon-web-services-cloud-failure-major-disruption" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?hl=en&amp;q=https://www.mprnews.org/story/2017/02/28/amazon-web-services-cloud-failure-major-disruption&amp;source=gmail&amp;ust=1524668789706000&amp;usg=AFQjCNFZiGtO0kOYvcJcjWqlZ2kPay90zQ">Amazon Web Services </a>encountered temporary issues with its eastern U.S. servers, leading to outages for thousands of customers. A well-implemented technology like Sia could avoid these types of errors by moving data off of proprietary servers and into the blockchain.</p>
<p dir="ltr">That&#8217;s not to say that Sia, in its current form, is a competitor to Amazon, but the technology could certainly get there. The blockchain has a myriad of exciting applications, but in our field, Sia is one of the best demonstrations of the tech&#8217;s potential.</p>
<div class="yj6qo"></div>
<p>The post <a href="https://datarecovery.com/rd/siacoin-change-data-storage/">How Siacoin Could Change Data Storage</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ransomware Market Expands as Healthcare Industry Continues Feeling the Effects</title>
		<link>https://datarecovery.com/rd/ransomware-market-expands-healthcare-industry-continues-feeling-effects/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Wed, 25 Oct 2017 17:44:50 +0000</pubDate>
				<category><![CDATA[Data Recovery News]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5452</guid>

					<description><![CDATA[<p>A <a href="https://www.carbonblack.com/wp-content/uploads/2017/10/Carbon-Black-Ransomware-Economy-Report-101117.pdf">computer security company determined</a> that the dark-web ransomware market has grown by 2,500 percent from 2016 to 2017. The company, Carbon Black, credits that expansion to the relative anonymity of Bitcoin and Tor as well as the lucrative return-on-investment...</p>
<p>The post <a href="https://datarecovery.com/rd/ransomware-market-expands-healthcare-industry-continues-feeling-effects/">Ransomware Market Expands as Healthcare Industry Continues Feeling the Effects</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A <a href="https://www.carbonblack.com/wp-content/uploads/2017/10/Carbon-Black-Ransomware-Economy-Report-101117.pdf">computer security company determined</a> that the dark-web ransomware market has grown by 2,500 percent from 2016 to 2017. The company, Carbon Black, credits that expansion to the relative anonymity of Bitcoin and Tor as well as the lucrative return-on-investment that ransomware offers.</p>
<p>“It’s like some sort of gold rush,” Limor Kessem, executive security adviser for IBM Security, <a href="https://www.nbcnews.com/tech/security/ransomware-now-billion-dollar-year-crime-growing-n704646">told NBC News</a>. “Cybercriminals are using ransomware to bring extortion to the masses and more criminals are now doing it because they’re interested in getting a piece of the action.”</p>
<p>The news is particularly worrisome for the healthcare industry, which is a frequent victim of ransomware. It&#8217;s not clear if hackers intentionally target hospitals and medical centers, but because doctors need access to crucial files, medical organizations feel more pressure to pay ransoms to restore data.</p>
<h2>Arkansas Oral and Facial Surgery Center is the latest victim from the medical industry.</h2>
<p>The healthcare organization <a href="https://www.scmagazine.com/128000-arkansas-oral-facial-surgery-center-patients-compromised/article/698227/">discovered the attack</a> on July 26, 2017, but only recently sent an explanation to its patients. In <a href="https://ofscenter.com/notice-to-patients/">the notice</a>, the medical practice explains that ransomware rendered three weeks worth of imaging files, x-rays, and other documents inaccessible.</p>
<p>The <a href="https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf">U.S. Department of Health and Human Services</a> lists the incident as a case currently under investigation and reports that 128,000 individuals may have been affected. The Arkansas Oral and Facial Surgery Center did not disclose information about a ransom payment, but did say that they reported the case to the FBI.</p>
<h2>A number of factors make the healthcare industry a frequent victim of ransomware attacks.</h2>
<p>Perhaps the biggest factor is that hospitals and other medical centers need immediate access to files. This makes them more likely to pay a hefty ransom, as happened with the <a href="http://www.latimes.com/business/technology/la-me-ln-hollywood-hospital-bitcoin-20160217-story.html">Hollywood Presbyterian Medical Center</a>.</p>
<p>A <a href="https://datarecovery.com/rd/locky-ransomware-infection-decryption-services/">Locky ransomware</a> attack froze up services at Hollywood Presbyterian in February 2016. The medical group quickly paid $17,000 to its attackers in order to receive a decryption key and regain access to their files.</p>
<p>In May 2017, <a href="http://www.cnn.com/2017/05/14/opinions/wannacrypt-attack-should-make-us-wanna-cry-about-vulnerability-urbelis/index.html">WannaCry ransomware</a> affected hundreds of thousands of computers in 150 countries. The most prominent victim was Britain&#8217;s National Health Service (NHS), whose services were severely disrupted by the incident.</p>
<h2>The NHS incident laid bare another factor that makes medical centers more susceptible to ransomware attacks.</h2>
<p>Many healthcare organizations use medical devices that run on older, unsupported operating systems. Because the systems no longer receive patches, hackers can find and exploit their vulnerabilities.</p>
<p>During the WannaCry attack, <em>Forbes</em> <a href="https://www.forbes.com/sites/thomasbrewster/2017/05/17/wannacry-ransomware-hit-real-medical-devices/">reported</a> that some medical facilities in the U.S. had radiology equipment compromised by the ransomware. Of course, healthcare facilities are reticent to say what operating systems they use, but clearly, many are relying on older systems.</p>
<p>This is horrifying to computer security experts, but it&#8217;s a simple matter of economics for hospitals. A ransomware attack is costly, but so is replacing a building full of medical equipment and retraining employees every time an operating system becomes obsolete.</p>
<h2>Operating systems are now adding defenses against ransomware, but that doesn&#8217;t protect everyone.</h2>
<p>Microsoft has been beefing up their anti-ransomware capabilities and <a href="https://blogs.technet.microsoft.com/mmpc/2017/06/08/windows-10-creators-update-hardens-security-with-next-gen-defense/">claims there have been no successful attacks</a> against their &#8220;most hardened&#8221; operating system, <a href="https://www.microsoft.com/en-us/windows/windows-10-s">Windows 10 S</a>. That&#8217;s great news for those who have up-to-date software, but leaves behind those organizations running unsupported systems.</p>
<p>For those organizations, backing up files offline and educating employees on phishing schemes are crucial to avoiding ransomware. Experts say that <a href="https://www.knowbe4.com/security-awareness-training-features/">security awareness training</a> for employees can dramatically decrease the rates of clicking on scam emails.</p>
<p>Training employees and using more secure operating systems will make it harder for successful ransomware attacks. Unfortunately, with the malware market burgeoning, hackers will continue searching for vulnerabilities in software and in internet users.</p>
<p>The post <a href="https://datarecovery.com/rd/ransomware-market-expands-healthcare-industry-continues-feeling-effects/">Ransomware Market Expands as Healthcare Industry Continues Feeling the Effects</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Petya Ransomware Infection And Decryption Services</title>
		<link>https://datarecovery.com/rd/petya-ransomware-infection-decryption-services/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Tue, 27 Jun 2017 21:36:27 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5341</guid>

					<description><![CDATA[<p>A Petya ransomware variant has swept through Europe in a fashion reminiscent of the <a href="https://datarecovery.com/rd/wannacrypt-ransomware-infection-decryption-services/">WannaCry attacks</a> of May 12, 2017. Like WannaCry, the Petya variant spreads using Eternal Blue and has affected the following businesses and organizations:</p>
<p>Utility companies, banks,...</p>
<p>The post <a href="https://datarecovery.com/rd/petya-ransomware-infection-decryption-services/">Petya Ransomware Infection And Decryption Services</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A Petya ransomware variant has swept through Europe in a fashion reminiscent of the <a href="https://datarecovery.com/rd/wannacrypt-ransomware-infection-decryption-services/">WannaCry attacks</a> of May 12, 2017. Like WannaCry, the Petya variant spreads using Eternal Blue and has affected the following businesses and organizations:</p>
<ul>
<li>Utility companies, banks, airports and supermarkets in Ukraine</li>
<li>Logistics company Maersk in the Netherlands</li>
<li>Food conglomerate Mondelez in Spain</li>
<li>Marketing firm WPP in the U.K.</li>
<li>Pharmaceutical giant Merck in the U.S.</li>
</ul>
<p>Tweets from around the world showed locked screens on ATMs, supermarket registers, and office computers with the same ransom note demanding $300 in Bitcoin.</p>
<blockquote class="twitter-tweet" data-lang="en">
<p dir="ltr" lang="en">All computers in our office are down. Global <a href="https://twitter.com/hashtag/Ransomware?src=hash">#Ransomware</a> attack. I&#8217;ve heard few other companies affected too. Backup and stay safe, guys. <a href="https://t.co/YNctmvdW2I">pic.twitter.com/YNctmvdW2I</a></p>
<p>— Mihir (@mihirmodi) <a href="https://twitter.com/mihirmodi/status/879678870471024640">June 27, 2017</a></p></blockquote>
<p><script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<p>If a Petya ransomware variant has infected your computer, turn it off, disconnect any media from it, and call Datarecovery.com at 1-800-237-4200. Our security experts will assess your situation and begin planning how to recover your files.</p>
<h2>What is Petya Ransomware (And How Does It Work)?</h2>
<p>Experts first detected <a href="https://www.symantec.com/connect/blogs/petya-ransomware-outbreak-here-s-what-you-need-know">Petya ransomware</a> in 2016. The malware differed from other types of ransomware in that it overwrote and encrypted a computer&#8217;s Master Boot Record preventing it from booting.</p>
<p>The recent attacks, which started on June 27, 2017, appear to be from a variant of Petya (which some experts are calling NotPetya). This new strain of ransomware is far more dangerous because it spreads laterally through networks using the Eternal Blue exploit.</p>
<p>To protect yourself from this Petya variant, <a href="https://researchcenter.paloaltonetworks.com/2017/06/unit42-threat-brief-petya-ransomware/">experts</a> recommend using <a href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx">this security update</a> from Microsoft, blocking inbound connections on TCP Port 445, and regularly maintaining back-ups of important files.</p>
<h3>Notable Features of Petya Ransomware Include:</h3>
<ul>
<li>Ransom note demands $300 bitcoin payment.</li>
<li>Email provider has shut down developer&#8217;s account making it impossible to notify attackers of paid ransom.</li>
<li>Victims include major companies and organizations in Ukraine, Russia, Netherlands, U.K., France, and United States.</li>
<li>Variant uses NSA&#8217;s Eternal Blue exploit to spread laterally through networks.</li>
</ul>
<p>The Petya variant targets the following file extensions:</p>
<p><em>.3ds, .7z., accdb, .ai, .asp, .aspx, .avhd, .back, .bak, .c, .cfg, .conf, .cpp, .cs, .ctl, .dbf, .disk, .djvu, .doc, .docx, .dwg, .eml, .fdb, .gz, .h, .hdd, .kdbx, .mail, .mdb, .msg, .nrg, .ora, .ost, .ova, .ovf, .pdf, .php, .pmf, .ppt, .pptx, .pst, .pvi, .py, .pyc, .rar, .rtf, .sln, .sql, .tar .vbox, .vbs, .vcb, .vdi, .vfd, .vmc, .vmdk, .vmsd, .vmx, .vsdx, .vsv, .work, .xls, .xlsx, .xvd, .zip</em></p>
<p>The above is not necessarily a comprehensive list but contains the known targeted extensions. In addition to encrypting the above files, Petya encrypts the Master File Tree and overwrites the Master Boot Record preventing computers from booting up altogether.</p>
<h2>How Does Petya Ransomware Infect My System?</h2>
<p>Researchers still have not pinpointed the initial vector of infection. One theory holds that an Office document attached to a spam email began the infection. Once the ransomware infects one computer on a network, the infection can spread laterally to out-of-date Windows machines.</p>
<h2>Can I Disable or Remove Petya Ransomware Encryption?</h2>
<p>There is no known decrypter for Petya ransomware or its variants. To make matters worse for victims, the email address of the attackers has been shut down. German email provider Posteo followed protocol and made the attacker&#8217;s account completely inaccessible once they learned of the incident.</p>
<p>With no working email address, there is no way to let the attackers know that a victim has paid the ransom. That leaves victims with no choice but to try to recover their files through other means. Datarecovery.com can assist you in locating back-up copies or in restoring partially encrypted files.</p>
<p>Contacting ransomware recovery experts as soon as possible gives victims the best chance at restoring their encrypted files. The specialists at Datarecovery.com have experience at removing malware and recovering seemingly lost documents. Call 1-800-237-4200 to start the process of restoring your files.</p>
<p>&nbsp;</p>
<p>The post <a href="https://datarecovery.com/rd/petya-ransomware-infection-decryption-services/">Petya Ransomware Infection And Decryption Services</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hidden Tear Ransomware Infection and Decryption Services</title>
		<link>https://datarecovery.com/rd/hidden-tear-ransomware-infection-decryption-services/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Fri, 09 Jun 2017 20:47:23 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5325</guid>

					<description><![CDATA[<p>Hidden Tear ransomware is an open-source malware program published by its developer for educational purposes. Though the author has since taken the source code offline, hackers around the world have already downloaded and redistributed it. Modified and improved variants of...</p>
<p>The post <a href="https://datarecovery.com/rd/hidden-tear-ransomware-infection-decryption-services/">Hidden Tear Ransomware Infection and Decryption Services</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hidden Tear ransomware is an open-source malware program published by its developer for educational purposes. Though the author has since taken the source code offline, hackers around the world have already downloaded and redistributed it. Modified and improved variants of the original Hidden Tear have now started to show up around the world.</p>
<p>If a Hidden Tear variant has infected your computer, turn it off, disconnect all media, and call Datarecovery.com at 1-800-237-4200. Our security experts can advise you on your options and begin the recovery process.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-5326" src="https://datarecovery.com/wp-content/uploads/2017/06/hidden-tear-ransomware-ascii-art.png" alt="Hidden Tear Ransomware ASCII art" width="453" height="138" srcset="https://datarecovery.com/wp-content/uploads/2017/06/hidden-tear-ransomware-ascii-art.png 453w, https://datarecovery.com/wp-content/uploads/2017/06/hidden-tear-ransomware-ascii-art-300x91.png 300w" sizes="auto, (max-width: 453px) 100vw, 453px" /></p>
<h2>What is Hidden Tear Ransomware and How Does It Work?</h2>
<p>Turkish programmer Utku Sen created Hidden Tear ransomware as an educational tool. He wrote a disclaimer on the site where others could download the source code, stating that the program was strictly educational. However, it wasn&#8217;t long before modified versions of the ransomware started infecting computers.</p>
<p><a href="https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/the-ongoing-development-of-hidden-tear-variants">Trend Micro</a> has already spotted several improved variants of Hidden Tear that allow victims to more easily pay ransoms. This trend follows the familiar pattern of ready-made malware giving attackers more time to focus on adding user-friendly features to increase payouts.</p>
<h3>Notable features of Hidden Tear ransomware include:</h3>
<ul>
<li>Open-source code allowed hackers to start with functional malware and improve it in a variety of ways.</li>
<li>Often has a more user-friendly interface (e.g. it can leave some files unencrypted or have a FAQ menu about payments).</li>
<li>Source code is behind many new variants such as <a href="http://blog.trendmicro.com/trendlabs-security-intelligence/new-open-source-ransomwar-based-on-hidden-tear-and-eda2-may-target-businesses/">KaoTear</a>, <a href="https://blog.malwarebytes.com/threat-analysis/2016/08/pokemongo-ransomware-comes-with-some-clever-tricks/">POGOTEAR</a>, and <a href="https://www.bleepingcomputer.com/news/security/new-fsociety-ransomware-pays-homage-to-mr-robot/">Fsociety</a>.</li>
</ul>
<p>The diversity of variants shows how big of a head start hackers have when they begin with viable malware. Instead of having to write sophisticated source code, they simply modify existing ransomware and add unique graphics or features. In the case of KaoTear, the attackers opened up an entirely new market by translating the ransom note into Korean and targeting a South Korean messaging app.</p>
<h2>How Does Hidden Tear Ransomware Infect My System?</h2>
<p>Because there are a variety of attackers distributing Hidden Tear variants, there&#8217;s no one particular vector of infection. However, due to its small file size of just 12 KB, attackers can easily hide the malware in an attachment to a phishing email. The POGOTEAR and KaoTear variants are disguised as a Pokemon app and a messaging app, which victims mistake for legitimate software.</p>
<p>Different variants of Hidden Tear target different files for encryption. A variant called May avoids encrypting files in several key directories to leave a computer more functional, presumably to make it easier to pay the ransom through an infected computer. A variant called MoWare targets the Desktop, Personal, MyMusic, and MyPictures folders. Because attackers can easily alter the source code, they can target any number of folders or files.</p>
<h2>Can I Disable or Decrypt Hidden Tear Ransomware?</h2>
<p>There is a freely available decrypter that works for many Hidden Tear variants. Due to the great variation within the ransomware family, this tool may or may not work for an infected computer. The security specialists at Datarecovery.com can assist you in determining what plan of action will most quickly restore your files.</p>
<p>If a Hidden Tear variant or other ransomware has infected your computer, call 1-800-237-4200 to speak with a malware expert. We can discuss your options and create a recovery plan to restore your files as soon as possible.</p>
<p>The post <a href="https://datarecovery.com/rd/hidden-tear-ransomware-infection-decryption-services/">Hidden Tear Ransomware Infection and Decryption Services</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>WannaCrypt Ransomware Infection and Decryption Services</title>
		<link>https://datarecovery.com/rd/wannacrypt-ransomware-infection-decryption-services/</link>
		
		<dc:creator><![CDATA[Ben Carmitchel]]></dc:creator>
		<pubDate>Mon, 15 May 2017 20:38:44 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5304</guid>

					<description><![CDATA[<p>WannaCrypt ransomware (also known as WannaCry and WanaCrpt0r 2.0) is the latest malware to make headlines by infecting over 250,000 computers in at least 150 countries around the world. Prominent victims include FedEx, Britain&#8217;s National Health System, Nissan, and telecom...</p>
<p>The post <a href="https://datarecovery.com/rd/wannacrypt-ransomware-infection-decryption-services/">WannaCrypt Ransomware Infection and Decryption Services</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">WannaCrypt ransomware (also known as WannaCry and WanaCrpt0r 2.0) is the latest malware to make headlines by infecting over 250,000 computers in at least 150 countries around the world. Prominent victims include FedEx, Britain&#8217;s National Health System, Nissan, and telecom giant Telefónica.</span></p>
<p><span style="font-weight: 400;">If you have a WannaCrypt infection, immediately shut down the infected device. Call Datarecovery.com at 1-800-237-4200 to discuss your case with a ransomware expert. </span></p>
<h2><span style="font-weight: 400;">What is WannaCrypt Ransomware (And How Does It Work)?</span></h2>
<p><span style="font-weight: 400;">WannaCrypt is a type of crypto-ransomware, a type of malware that encrypts a victim&#8217;s files so that they are inaccessible. The attackers then demand a ransom in return for a decryption key.</span></p>
<div style="width: 490px" class="wp-caption alignright"><img loading="lazy" decoding="async" src="https://s.aolcdn.com/hss/storage/midas/3df0c98851982e721be822c377c3d6b8/205264080/WannaCrypt-ransom-executable.png" alt="WannaCrypt message" width="480" height="346" /><p class="wp-caption-text">WannaCrypt message. c/o Engadget.</p></div>
<p><span style="font-weight: 400;">What sets WannaCrypt apart from other ransomware is its unique ability to spread across networks. Likely by using an exploit developed by the U.S. National Security Agency (NSA), WannaCrypt can spread through a network to other machines that have an unpatched Windows operating system. </span></p>
<p><span style="font-weight: 400;">This was particularly devastating for networks using unsupported operating systems like Windows XP, because there were no patches available. Many companies use older operating systems in order to keep software that is incompatible with newer systems. </span></p>
<p><a href="https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/"><span style="font-weight: 400;">Microsoft</span></a><span style="font-weight: 400;"> has now created patches for Windows XP, Windows 8, and Windows Server 2003 in direct response to the WannaCrypt epidemic, despite the fact that the company hasn&#8217;t officially supported XP or 2003 for years. </span></p>
<p><span style="font-weight: 400;">This response helps to underline the severity of the problem; the WannaCrypt attack is easily one of the largest ransomware attacks in history. </span></p>
<p><span style="font-weight: 400;">Notable features of WannaCrypt Ransomware Include:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">WannaCrypt spreads to unpatched computers in the same network as infected computer.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">It demands a $300 to $600 initial ransom, paid in bitcoin. This amount may increase over time.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">The program has spread to at least 150 countries.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Prominent victims include NHS, Telefonica, Renault, and FedEx.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">WannaCrypt was temporarily stopped, but new variants are already active.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Attackers have likely collected over $56,000 in ransom money.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">About 200,000 computers have been infected by WannaCrypt and its variants, but the number is growing rapidly.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">The original version of WannaCrypt uses 2048-bit AES encryption. </span></li>
</ul>
<p><span style="font-weight: 400;">Currently, we believe that WannaCrypt uses two NSA exploits, codenamed  ETERNALBLUE and DOUBLEPULSAR. These exploits target the Windows Server Message Block (SMB) version 1 file sharing protocol. Recent Windows updates prevent these protocol from being exploited, but many computer systems haven&#8217;t received recent updates; as such, the ransomware moves very quickly in some networks. </span></p>
<p><span style="font-weight: 400;">The spread of WannaCrypt was temporarily halted when a security expert with the Twitter handle </span><a href="https://twitter.com/MalwareTechBlog"><span style="font-weight: 400;">Malware Tech</span></a><span style="font-weight: 400;"> registered a domain name he noticed in the ransomware&#8217;s code. He intended to use the domain to analyze the infections, but it inadvertently worked as a kill switch and stopped the spread of the malware. Essentially, the program prompts a command &amp; control server at the domain name in question; when it stopped receiving a response, it stopped spreading. </span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">This prevented many infections, but researchers have already spotted new variants of the malware without the so-called &#8220;kill switch.&#8221; The original version of the worm was not proxy-aware, and therefore, the kill switch wouldn&#8217;t work for networks on proxies. </span></p>
<p><span style="font-weight: 400;">Authorities are searching for the creators of the ransomware; in past cases, when institutions such as the FBI are able to apprehend the writers of malicious ransomware programs, the keys are quickly released. This allows users to restore their data without paying the ransom.</span></p>
<p><span style="font-weight: 400;">However, there is no guarantee that authorities are close to arrests—or that they&#8217;re anywhere close.   </span></p>
<h2><span style="font-weight: 400;">How Does WannaCrypt Ransomware Infect My System?</span></h2>
<p><span style="font-weight: 400;">Experts believe that WannaCrypt initially infected computers through a phishing email or a network vulnerability. An NHS employee claimed that a spam email infected the first computer at a Lancashire, England location. </span></p>
<p><span style="font-weight: 400;">Once WannaCrypt infects a single machine on a network, it can spread to others that do not have the critical patch. It can spread through LAN, so we recommend disconnecting Ethernet before powering on any computer that might be infected. </span></p>
<p><span style="font-weight: 400;">Users should also apply the newest security patches, as this provides protection from other computers infected with the ransomware. However, the ransomware can still infect a patched computer through the traditional means of malicious email attachments. </span></p>
<h2><span style="font-weight: 400;">Can I Disable or Remove WannaCrypt Ransomware Encyption?</span></h2>
<p><span style="font-weight: 400;">Currently, there is no WannaCrypt decrypter available without paying the ransom. As with all ransomware, the best defense is to prevent infection in the first place. The most critical step for this fast-moving malware is to update your Windows operating system.</span></p>
<p><span style="font-weight: 400;">Datarecovery.com is investigating workarounds, but because WannaCrypt uses an operational algorithm, some files may be recoverable with traditional methods. The software makes an encrypted copy of each file, then deletes the original; in some cases, we&#8217;re able to recover the original file, although with this method, there&#8217;s virtually no possibility of a full recovery. </span></p>
<p><span style="font-weight: 400;">For large files on a network, our specialists may also be able to limit or reduce ransoms. In any case, fast treatment is absolutely essential, especially when WannaCrypt ransomware infects an entire network. </span></p>
<p><span style="font-weight: 400;">To begin recovering files from a WannaCrypt infection or to learn more, call 1-800-237-4200 and ask to speak to a ransomware specialist.</span></p>
<p>The post <a href="https://datarecovery.com/rd/wannacrypt-ransomware-infection-decryption-services/">WannaCrypt Ransomware Infection and Decryption Services</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>St. Louis Public Library Grinds to a Halt Due to Ransomware Attack</title>
		<link>https://datarecovery.com/rd/st-louis-public-library-grinds-halt-due-ransomware-attack/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Fri, 20 Jan 2017 21:32:48 +0000</pubDate>
				<category><![CDATA[Data Recovery News]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?page_id=4705</guid>

					<description><![CDATA[<p>The potential threat of a ransomware attack became a reality for the <a href="http://www.slpl.org/">St. Louis Public Library</a> on Jan. 19. Hackers took down approximately 700 computers used by both staff and the public in the library system&#8217;s central location and 15...</p>
<p>The post <a href="https://datarecovery.com/rd/st-louis-public-library-grinds-halt-due-ransomware-attack/">St. Louis Public Library Grinds to a Halt Due to Ransomware Attack</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The potential threat of a ransomware attack became a reality for the <a href="http://www.slpl.org/">St. Louis Public Library</a> on Jan. 19. Hackers took down approximately 700 computers used by both staff and the public in the library system&#8217;s central location and 15 branches.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-4715" src="https://datarecovery.com/wp-content/uploads/2017/01/st-louis-public-library-exterior-500.jpg" alt="st louis public library, exterior at night" width="500" height="331" srcset="https://datarecovery.com/wp-content/uploads/2017/01/st-louis-public-library-exterior-500.jpg 500w, https://datarecovery.com/wp-content/uploads/2017/01/st-louis-public-library-exterior-500-300x199.jpg 300w" sizes="auto, (max-width: 500px) 100vw, 500px" /></p>
<p>The particular strain of ransomware is unknown, but SLPL staff reported that the attackers demanded a ransom of 38 bitcoins ($34,020 at time of writing) to restore data and software functionality. The attack disabled both circulation and computer booking software, which meant that the public could neither check out materials nor use computers. Libraries were eerily quiet and the SLPL website declared, &#8220;Check out and computer services at all Library locations have been suspended.&#8221;</p>
<p>When staff arrived to work on Thursday, Jan. 19, their computer desktops were blank except for the recycle bin. One staff member found a ransom note in her computer&#8217;s download folder that requested 38 bitcoins to restore all functionality. The same note conveyed that for less money, individual computers could be restored. Internet Explorer was the only software that the attack left usable. Presumably, this was to ensure that library management had a way to pay the exorbitant ransom demand.</p>
<p><a href="https://datarecovery.com/services/ransomware-recovery/"><img loading="lazy" decoding="async" class="alignright size-full wp-image-4500" src="https://datarecovery.com/wp-content/uploads/2016/04/encrypted-156514_176x192.png" alt="encrypted data key" width="176" height="192" />Ransomware</a> is a malicious type of computer software that encrypts a computer&#8217;s files so that they are unusable until the victim pays a ransom for a decryption key. Depending on the extent of the attack, drives that are mapped to the target can also be compromised. The attack on SLPL encrypted all data on their hard drives and rendered their circulation and computer-booking systems unusable.</p>
<p>The library decided not to pay the ransom when they learned of the attack. Jen Hatton, a spokeswoman for the library, told the <em>St. Louis Post-Dispatch</em> that the library&#8217;s IT department would be able to fix the damage. Businesses and other organizations often pay out of desperation. Fortunately, public libraries have the luxury of shutting down services without the fear of losing out to competitors.</p>
<p>Libraries in the SLPL system were sparsely populated Thursday as most services were rendered inoperable due to the attack. Because staff computers still had access to Internet Explorer, librarians were able to address reference questions on their computers. Patrons still had access to Wi-Fi as well.</p>
<div style="width: 510px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" src="https://c1.staticflickr.com/9/8213/8323985105_1c4d573fdf.jpg" alt="St. Louis Public Library" width="500" height="375" /><p class="wp-caption-text">St. Louis Public Library, by Chris Yunker <a title="St. Louis Public Library" href="https://www.flickr.com/photos/chris-yunker/8323985105/">via Flickr</a></p></div>
<p>By Friday morning, SLPL reported that they had regained control of their server, but still had not restored functionality to material circulation and computer booking services. An SLPL employee reported that IT had to work through the problem &#8220;computer by computer&#8221; for each of the 700 affected machines.</p>
<p>SLPL is one of the highest-profile targets of a ransomware attack. Experts believe that the library was targeted rather than the victim of random phishing emails because of the extent of the damage. SLPL may be one of the largest, but they are not the first high-profile target to be successfully hacked.</p>
<p>The <a href="https://www.sfmta.com/about-sfmta/blog/update-sfmta-ransomware-attack">San Francisco Municipal Transportation Agency</a> fell victim to a ransomware scheme that forced them to freeze their ticket kiosks and give free rides. They chose not to pay the ransom and voluntarily shut down public kiosks to minimize potential damage. The SFMTA maintains that no customer or staff data was compromised, though 900 office computers were impacted.</p>
<p>Other large institutions have chosen to pay ransoms to minimize the impact of attacks. <a href="http://www.latimes.com/business/technology/la-me-ln-hollywood-hospital-bitcoin-20160217-story.html">Hollywood Presbyterian Medical Center</a>, <a href="http://www.bbc.com/news/technology-36478650">The University of Calgary</a>, <a href="http://www.theregister.co.uk/2016/11/29/canadian_uni_prey_to_ransomware/">Carleton University</a>, and <a href="http://www.ibtimes.co.uk/us-hackers-infiltrate-melrose-police-station-software-charge-one-bitcoin-its-release-1546816">The Melrose Police Department</a> all suffered attacks and chose to pay the ransom to restore their data and operability. Experts warn that paying attackers can embolden them to make more attacks.</p>
<p>The major attacks of the last year have proven that ransomware is a very real threat to organizations big and small. Backing up data, not clicking on suspicious links and attachments, and updating software are good ways to avoid falling victim. For the time being, ransomware attacks appear to be the price of doing business on an open internet.</p>
<p>The post <a href="https://datarecovery.com/rd/st-louis-public-library-grinds-halt-due-ransomware-attack/">St. Louis Public Library Grinds to a Halt Due to Ransomware Attack</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cerber Ransomware Infection And Decryption Services</title>
		<link>https://datarecovery.com/rd/cerber-ransomware-infection-decryption-services/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Wed, 07 Dec 2016 18:03:33 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=4634</guid>

					<description><![CDATA[<p>Cerber ransomware is a quickly evolving type of malware that encrypts files on a computer so that they are unreadable. The attackers then demand a ransom to decrypt the files.<br />
If Cerber has infected your computer, turn it off, disconnect...</p>
<p>The post <a href="https://datarecovery.com/rd/cerber-ransomware-infection-decryption-services/">Cerber Ransomware Infection And Decryption Services</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignright wp-image-4500 size-full" src="https://datarecovery.com/wp-content/uploads/2016/04/encrypted-156514_176x192.png" alt="encrypted data key image" width="176" height="192" />Cerber ransomware is a quickly evolving type of malware that encrypts files on a computer so that they are unreadable. The attackers then demand a ransom to decrypt the files.</p>
<p>If Cerber has infected your computer, turn it off, disconnect all media from it, and call Datarecovery.com at 1-800-237-4200. Our malware experts can assess your situation and begin a plan to restore your files.</p>
<h2>What is Cerber Ransomware (And How Does It Work)?</h2>
<p>Cerber is a type of malware called crypto-ransomware. Attackers find a way to gain entrance to a victim&#8217;s computer, and then Cerber encrypts the files on that computer. Encryption is normally used for keeping the information in files secret, but when crypto-ransomware encrypts files, the goal is to withhold the information from the rightful owner until a ransom is paid.</p>
<p><img loading="lazy" decoding="async" class="alignright wp-image-4640 size-full" title="Cerber ransom note files and changed filenames screenshot" src="https://datarecovery.com/wp-content/uploads/2016/12/cerber-ransom-note-files-and-changed-filenames3c.png" alt="Cerber ransom note files and changed filenames screenshot" width="237" height="127" />After Cerber has encrypted all of the files it can and renamed them to unrecognizable names often with extension &#8220;.cerber&#8221;, it puts a note for the victim on the computer desktop. It also creates several ransom note files. These include a text file, HTML file, and a VBS (Visual Basic Script), usually named like &#8220;# DECRYPT MY FILES #&#8221;. The messages direct the victim on how to pay the ransom, which generally starts at 1.24 bitcoins ($917 at the time of writing).</p>
<h2>Notable Features of Cerber Ransomware Include:</h2>
<ul>
<li>The ransom doubles from 1.24 to 2.48 bitcoins after seven days of nonpayment.</li>
<li>Attackers can buy Cerber from underground Russian forums, which makes ransomware attacks possible from anyone with enough money to pay.</li>
<li>In July of 2016 alone, victims paid $195,000 to Cerber assailants in order to decrypt encrypted files.</li>
<li>Cerber has targeted more than 150,000 computer users, including both individuals and businesses, in July of 2016 with no signs of slowing.</li>
<li>Cerber favors targeting businesses over individuals because of the malware&#8217;s ability to encrypt databases and mapped or unmapped network shares. This can cripple businesses.</li>
<li>When Cerber initiates, it first checks a victim&#8217;s computer to see if they are from a variety of former-Soviet republics. If the computer is from any of these countries, the ransomware terminates and does not infect the computer.</li>
</ul>
<p>Security experts have cracked the earliest version of Cerber, but the developers have already responded by updating the malware to an as-yet unbreakable version. Retrieving backup copies of data is more feasible than decrypting files for the later versions of Cerber.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-4636 size-full" title="Cerber ransom note screenshot" src="https://datarecovery.com/wp-content/uploads/2016/12/cerber-ransom-note-screenshot1b.png" alt="Cerber ransom note screenshot" width="649" height="435" srcset="https://datarecovery.com/wp-content/uploads/2016/12/cerber-ransom-note-screenshot1b.png 649w, https://datarecovery.com/wp-content/uploads/2016/12/cerber-ransom-note-screenshot1b-300x201.png 300w" sizes="auto, (max-width: 649px) 100vw, 649px" /></p>
<p><a href="https://datarecovery.com/services/ransomware-recovery/cerber-ransomware-note-example/">View the full ransom note screenshot here</a></p>
<h2>How Does Cerber Ransomware Infect My System?</h2>
<p>Cerber infects a computer when the user clicks on a malvertisement, or malicious advertisement. Malvertisements are the preferred way for criminals to attack computers. Criminals can place legitimate advertisements on a website until the site trusts them, and then they place an ad that is capable of hijacking a computer when someone clicks on it.</p>
<p>The compromised advertisements are made to look as innocuous and legitimate as possible. However, once someone clicks on one of them, the visitor can be tricked into downloading the payload. After Cerber encrypts all of the files it can, it leaves a note with instructions on how to pay the ransom.</p>
<p>Paying the ransom and decrypting the data is a convoluted and uncertain process. It involves temporary web pages that go offline after a short period, installation of the Tor Browser, .onion sites (also temporary) on the Tor anonymous network, crypto-coin wallet management and exchange transactions, and of course executing the decryption process with the unique decryptor. Worst of all, there is no guarantee that the attackers will provide a working decryptor software once the ransom is paid. Even when cyber-criminals attempt to send a working decryptor, there can be technical difficulties that leave the victim out of money and without their files. One common example we&#8217;ve seen is two different intances of the ransomware software having run independently and caused overlapped encryption.</p>
<h2>Can I Disable or Remove Cerber Ransomware Encryption?</h2>
<p>As with all malware, prevention is the best defense. However, if Cerber has already infected your machine, recovering files from alternate sources is preferable to decrypting the files. An early version of Cerber has been cracked, but the developers continue to update the malware and later versions have proved tougher to break.</p>
<p>If you believe that Cerber has infected your computer, remember that consulting professionals quickly is in your best interest. Datarecovery.com can help you determine if you have backup copies of your files and determine the best way to recover them.</p>
<p>Call 1-800-237-4200 to start the process of restoring your unreadable files. Our malware experts will analyze your situation and begin the process of recovering your information.</p>
<p>The post <a href="https://datarecovery.com/rd/cerber-ransomware-infection-decryption-services/">Cerber Ransomware Infection And Decryption Services</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 125/187 objects using Memcached
Page Caching using Disk: Enhanced 
Minified using Disk

Served from: datarecovery.com @ 2026-04-13 19:23:21 by W3 Total Cache
-->