<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>encryption Archives - Datarecovery.com</title>
	<atom:link href="https://datarecovery.com/tag/encryption/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description></description>
	<lastBuildDate>Thu, 19 Apr 2018 20:22:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>SamSam Ransomware Infection And Decryption Services</title>
		<link>https://datarecovery.com/rd/samsam-ransomware-infection-decryption-services/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Wed, 11 Apr 2018 20:15:49 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5761</guid>

					<description><![CDATA[<p>SamSam ransomware (also known as Samas, SamSamCrypt, and MSIL) is a quickly evolving type of malware that targets hospitals, municipalities, and other large organizations. After installing malicious software through compromised servers, the hackers encrypt network files, making them unusable, and...</p>
<p>The post <a href="https://datarecovery.com/rd/samsam-ransomware-infection-decryption-services/">SamSam Ransomware Infection And Decryption Services</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>SamSam ransomware (also known as Samas, SamSamCrypt, and MSIL) is a quickly evolving type of malware that targets hospitals, municipalities, and other large organizations. After installing malicious software through compromised servers, the hackers encrypt network files, making them unusable, and demand a ransom.</p>
<p>If SamSam has infected your computer or network, turn off computer(s), disconnect all media, and call Datarecovery.com at 1-800-237-4200. Our ransomware experts will assess your situation and offer a plan to restore your files and remove SamSam.</p>
<h2>What is SamSam Ransomware (And How Does It Work)?</h2>
<p>SamSam is a type of crypto-ransomware, which means the malware encrypts files in such a way that only the attacker can decrypt them. If a victim doesn&#8217;t pay the ransom or have current backups, recovery from SamSam is extremely difficult. Hospitals and city governments have found that a SamSam attack cripples the organization&#8217;s ability to function normally, leading some to pay the ransom.</p>
<h3>Notable Targets of SamSam Ransomware Include:</h3>
<ul>
<li><a href="http://www.baltimoresun.com/health/bs-md-medstar-ransom-hack-20160330-story.html">MedStar</a> 27, 2016 ($18,500 ransom)</li>
<li><a href="https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/samsam-ransomware-moves-from-healthcare-to-education">Follet&#8217;s Learning Destiny software</a> 2016 (undisclosed ransom)</li>
<li><a href="http://buffalonews.com/2017/05/20/ecmc-got-hacked-cyber-extortionists/">Erie County Medical Center</a> 9, 2017 ($44,000 ransom)</li>
<li><a href="http://www.daily-times.com/story/news/local/farmington/2018/01/18/farmington-recovering-after-ransomware-attack/1044845001/">City of Farmington, NM</a> 3, 2018 ($35,000 ransom)</li>
<li><a href="http://wane.com/2018/01/18/ransomware-attack-targets-adams-memorial-hospital/">Adams Memorial Hospital</a> 11, 2018 (undisclosed ransom)</li>
<li><a href="https://datarecovery.com/rd/indiana-hospital-pays-55000-get-rid-ransomware/">Hancock Health</a> 11, 2018 ($55,000 ransom)</li>
<li><a href="http://www.govtech.com/security/Davidson-County-NC-Still-Reeling-from-Ransomware-Attack.html">Davidson County, N.C.</a> 16, 2018 (undisclosed ransom)</li>
<li><a href="https://datarecovery.com/rd/samsam-ransomware-infects-cdot/">Colorado Dept. of Transportation</a> 21 and March 1, 2018 (undisclosed ransom)</li>
<li><a href="https://www.myajc.com/news/local-govt--politics/atlanta-officials-warn-cyber-attack-may-compromise-sensitive-data/afZLYCO14WySObFATzKXRP/">City of Atlanta, GA </a>March 22, 2018 ($51,000 ransom)</li>
</ul>
<p>In addition to these high-profile targets, there have been other unspecified victims. A <a href="https://www.fbi.gov/file-repository/ransomware-prevention-and-response-for-cisos.pdf/view">2016 FBI alert</a> referred to multiple &#8220;attacks on healthcare facilities&#8221; without mentioning specific names. More recently, an <a href="https://blog.barkly.com/samsam-ransomware-2018-campaign-hospital-attacks">unnamed Industrial Control Systems</a> (ICS) company was hit by the ransomware.</p>
<h2>How Does SamSam Ransomware Infect My System?</h2>
<p>Unlike the majority of ransomware, SamSam does not spread through spam emails or malicious links. Instead, the distributors target vulnerable servers using brute-forced credentials or by exploiting outdated software. After gaining access, the hackers harvest other credentials and use <a href="https://msdn.microsoft.com/en-us/library/aa383015(v=vs.85).aspx">Remote Desktop Protocol</a> to manually spread SamSam through a network.</p>
<p>The attackers wait a number of days before executing the ransomware payload, making it harder for organizations to discover the initial breach. This can allow the hackers to reinfect a system if the organization attempts to recover without paying the ransom, as happened with the <a href="https://www.denverpost.com/2018/03/01/cdot-samsam-ransomware-attack/">Colorado Department of Transportation</a>. After sufficient time has passed, the hackers run batch scripts which begin running the ransomware. Once SamSam has encrypted files, it drops a ransom note with the payment demand, which varies by incident.</p>
<h2>Can I Disable or Remove SamSam Ransomware Encryption?</h2>
<p>Removing SamSam and decrypting affected files is difficult. As such, it is critical to prevent the ransomware from infecting systems with the following best practices:</p>
<ul>
<li>Update all software promptly (businesses should use a centralized <a href="https://searchsecurity.techtarget.com/feature/Read-this-roundup-before-investing-in-a-patch-management-tool">patch management system</a> to detect vulnerabilities).</li>
<li>Limit the number of attempts to correctly enter passwords for systems.</li>
<li>Regularly back up data while maintaining redundant copies — SamSam can spread to network-based backups before it begins encrypting files, which makes recovery from an attack more difficult when only one backup exists.</li>
<li>Use the <a href="https://www.us-cert.gov/bsi/articles/knowledge/principles/least-privilege">principle of least privilege</a> to mitigate damage done by ransomware.</li>
</ul>
<p>If your systems have been infected by SamSam, Datarecovery.com can help. We&#8217;ll assess your situation and start you down the road to recovery as soon as you call or <a href="https://datarecovery.com/submit.php">start a case</a> with us.</p>
<p>As with all data recovery situations, time is an important factor. If ransomware has infected your computer or network, call 1-800-237-4200 to speak to a malware expert. We&#8217;ll go over your options and help determine the best way to recover from a SamSam attack.</p>
<p>The post <a href="https://datarecovery.com/rd/samsam-ransomware-infection-decryption-services/">SamSam Ransomware Infection And Decryption Services</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>City of Atlanta Hit by SamSam Ransomware</title>
		<link>https://datarecovery.com/rd/city-atlanta-hit-samsam-ransomware/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Mon, 02 Apr 2018 01:08:24 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Data Recovery News]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5751</guid>

					<description><![CDATA[<p>A ransomware attack on the city of Atlanta on Mar. 22 has left officials scrambling to provide services to residents. Many critical services, like public-safety and wastewater treatment, have been unaffected. Meanwhile, other systems have ground to a halt or...</p>
<p>The post <a href="https://datarecovery.com/rd/city-atlanta-hit-samsam-ransomware/">City of Atlanta Hit by SamSam Ransomware</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="size-medium wp-image-5752 alignright" src="https://datarecovery.com/wp-content/uploads/2018/03/DY6FRveW0AIGpt9-300x269.jpg" alt="City of Atlanta Outage Alert, SamSam Ransomware" width="300" height="269" srcset="https://datarecovery.com/wp-content/uploads/2018/03/DY6FRveW0AIGpt9-300x269.jpg 300w, https://datarecovery.com/wp-content/uploads/2018/03/DY6FRveW0AIGpt9-768x688.jpg 768w, https://datarecovery.com/wp-content/uploads/2018/03/DY6FRveW0AIGpt9-1024x917.jpg 1024w, https://datarecovery.com/wp-content/uploads/2018/03/DY6FRveW0AIGpt9.jpg 2048w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p>A ransomware attack on the city of Atlanta on Mar. 22 has left officials scrambling to provide services to residents. Many critical services, like public-safety and wastewater treatment, have been unaffected. Meanwhile, other systems have ground to a halt or slowed considerably.</p>
<p>For instance, the city is temporarily not accepting employment applications. New water service requests and other planning services can be made in person, but processing times are longer than usual. The Hartsfield-Jackson International Airport <a href="https://www.myajc.com/news/local-govt--politics/city-atlanta-officials-provides-little-detail-about-cyberattack/FK2gvnRumL046dgtXmF5TK/">has disabled its wifi</a> and taken security wait times and flight information off its website out of an abundance of caution.</p>
<p>Perhaps the biggest headache for the city is <a href="http://abcnews.go.com/US/atlanta-cyberattack-massive-inconvenience-city-mayor/story?id=53974558">keeping the courts running</a> during the mayhem. The city court cannot validate warrants or process ticket payments (even in person). Court dates continue being pushed back (via tweets) as the city struggles with the ransomware attack.</p>
<blockquote class="twitter-tweet" data-lang="en">
<p dir="ltr" lang="en">RESET NOTICES WILL BE MAILED. <a href="https://t.co/hyV3pcLSE0">pic.twitter.com/hyV3pcLSE0</a></p>
<p>— ATL Municipal Court (@ATLCourt) <a href="https://twitter.com/ATLCourt/status/978984086265106432?ref_src=twsrc%5Etfw">March 28, 2018</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<p><strong>Mayor Keisha Lance Bottoms gave few details on what the city&#8217;s response would be.</strong></p>
<p>When asked if she would consider paying the $51,000 ransom, Bottoms admitted, &#8220;Everything is up for discussion.&#8221; She added that she would <a href="https://www.npr.org/sections/thetwo-way/2018/03/27/597208778/atlanta-working-around-the-clock-to-fight-off-ransomware-attack">consult with federal authorities</a> to determine the best course of action. The city hired a private security company, SecureWorks, to investigate the attack. The FBI, Homeland Security, and the Secret Service are all involved in determining exactly what happened.</p>
<p>&#8220;I just want to make the point that this is much bigger than a ransomware attack,&#8221; Bottoms said at a press conference. &#8220;This is really an attack on our government, which means it&#8217;s an attack on all of us.&#8221;</p>
<p><strong>Fears that the attackers accessed personal data continue. </strong></p>
<p>Officials initially <a href="https://www.myajc.com/news/local-govt--politics/atlanta-officials-warn-cyber-attack-may-compromise-sensitive-data/afZLYCO14WySObFATzKXRP/">warned city employees</a> and any member of the public who had made transactions with the city to check their bank accounts for fraudulent activity.</p>
<p>“Because we don’t know, I think it would be appropriate for the public just to be vigilant in checking their accounts and making sure their credit agencies have also been notified,” Bottoms said shortly after the incident.</p>
<p>On March 26, an official tweet from the city reiterated that sentiment but added that there is still no evidence that sensitive data has been compromised.</p>
<blockquote class="twitter-tweet" data-lang="en">
<p dir="ltr" lang="en">GENERAL REMINDER: At this time, there is no evidence to show that customer or employee data has been compromised. However, customers and employees are encouraged to take precautionary measures to monitor and protect their personal information.</p>
<p>— City of Atlanta, GA (@Cityofatlanta) <a href="https://twitter.com/Cityofatlanta/status/978966933155573761?ref_src=twsrc%5Etfw">March 28, 2018</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<p><strong>The city hasn&#8217;t identified the attacker, but media reports point to a familiar name.</strong></p>
<p>A <em>New York Times</em> article <a href="https://www.nytimes.com/2018/03/27/us/cyberattack-atlanta-ransomware.html?mtrref=www.google.com">has identified</a> the SamSam hacking crew as the responsible party. While few details are known about SamSam, they do have several trademarks.</p>
<p>The group tends to target large organizations who have the resources to pay a hefty ransom. SamSam also has sophisticated methods of covering their tracks that allow them to attack organizations repeatedly.</p>
<p><strong>The same group victimized the Colorado Department of Transportation twice this year.</strong></p>
<p>The <a href="https://datarecovery.com/rd/samsam-ransomware-infects-cdot/">first attack</a> shut down over 2,000 employee computers, forcing workers to use pen and paper to complete work. The city decided not to pay the ransom, but to painstakingly clean the computers of any malware.</p>
<p>When the city&#8217;s IT professionals had cleared 20 percent of computers for employee use, a variant of <a href="https://www.denverpost.com/2018/03/01/cdot-samsam-ransomware-attack/">SamSam reinfected them</a>. Hearing stories like these, it&#8217;s easy to understand why some organizations simply pay the ransom.</p>
<p>To put even more pressure on victims, the SamSam attackers generally target health care facilities and municipal organizations. <a href="https://www.scmagazine.com/samsam-ransomware-continues-to-wreak-havoc-on-infrastructure/article/738983/">Allscripts</a>, <a href="http://wane.com/2018/01/18/ransomware-attack-targets-adams-memorial-hospital/">Adams Memorial Hospital</a>, <a href="http://buffalonews.com/2017/05/20/ecmc-got-hacked-cyber-extortionists/">Erie County Medical Center</a>, and the city of <a href="http://www.daily-times.com/story/news/local/farmington/2018/01/18/farmington-recovering-after-ransomware-attack/1044845001/">Farmington, New Mexico</a> all fell prey to SamSam ransomware in the last year.</p>
<p><strong>Atlanta is now learning a painful but useful lesson in cybersecurity.</strong></p>
<p>The city is documenting its progress and answering frequently asked questions on <a href="https://www.atlantaga.gov/government/ransomware-cyberattack-information">its website</a>, while the mayor promises that more attention will be given to cybersecurity in the future.</p>
<p>&#8220;Just as much as we really focus on our physical infrastructure, we need to focus on the security of our digital infrastructure,&#8221; <a href="https://www.cnn.com/2018/03/27/us/atlanta-ransomware-computers/index.html">Bottoms said</a>. &#8220;I am looking forward to us really being a national model of how cities can shore themselves up and be stronger because of it.&#8221;</p>
<p>&nbsp;</p>
<p>The post <a href="https://datarecovery.com/rd/city-atlanta-hit-samsam-ransomware/">City of Atlanta Hit by SamSam Ransomware</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Only Half of Ransomware Payments Resulted in Decrypted Files</title>
		<link>https://datarecovery.com/rd/half-ransomware-payments-resulted-decrypted-files/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Wed, 21 Mar 2018 20:49:43 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Data Recovery News]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5734</guid>

					<description><![CDATA[<p>A report from a leading research firm found a startling statistic for 2017: only half of ransomware victims who paid a ransom were able to successfully decrypt their files. These findings and others in the report offer even more incentive...</p>
<p>The post <a href="https://datarecovery.com/rd/half-ransomware-payments-resulted-decrypted-files/">Only Half of Ransomware Payments Resulted in Decrypted Files</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A report from a leading research firm found a startling statistic for 2017: only half of ransomware victims who paid a ransom were able to successfully decrypt their files. These findings and others in the report offer even more incentive to confront and adapt to new security challenges in 2018.</p>
<p><strong>The report came from CyberEdge, who surveyed 1,200 IT security professionals and is not affiliated with any security vendor.</strong></p>
<p><img loading="lazy" decoding="async" class="alignright size-medium wp-image-5746" src="https://datarecovery.com/wp-content/uploads/2018/03/cyberthreat-defense-report-2018-by-cyberedge2-300x267.png" alt="Cyberthreat Defense Report 2018 by Cyberedge" width="300" height="267" srcset="https://datarecovery.com/wp-content/uploads/2018/03/cyberthreat-defense-report-2018-by-cyberedge2-300x267.png 300w, https://datarecovery.com/wp-content/uploads/2018/03/cyberthreat-defense-report-2018-by-cyberedge2.png 327w" sizes="auto, (max-width: 300px) 100vw, 300px" />Their <a href="https://cyber-edge.com/wp-content/uploads/2018/03/CyberEdge-2018-CDR.pdf">2018 Cyberthreat Defense Report</a> is an attempt to understand the variety of threats faced by organizations that employ at least 500 people. The results showed that cyberattacks have become increasingly successful over the past five years (though, mercifully, the number of successful attacks is slightly down from last year).</p>
<p>Another illuminating trend is that the percentage of IT professionals who are optimistic about dodging successful attacks in the coming year went from 62 percent in 2014 to 38 percent in 2018. This can be viewed as pessimism or realism, but either way, it&#8217;s an acknowledgement of the great challenges ahead. Respondents listed application containers (like Docker or Rocket), mobile devices, and cloud infrastructure as the weakest links likely to be targeted by a cyberattack.</p>
<p><strong>Malware (viruses, worms, trojans) was voted as the number one general threat to IT security for the second year in a row.</strong></p>
<p>Second place was a tie between ransomware and phishing attacks. Given that many ransomware attacks were paired with worms and other malware (as well as phishing attacks), you can understand how big of a concern ransomware is for security professionals.</p>
<p>And it was not a rare phenomenon either. A surprising 55 percent of surveyed organizations were hit by ransomware in 2017. One area of good news was that many who refused to pay ransoms still recovered their data. Instead of buckling to cybercriminals, they worked to recover data from backups or simply dealt with the data loss. Almost 87 percent of victims who did not pay the ransom recovered their data anyway.</p>
<p>The scarier news was that only 49.6 percent of ransomware victims who paid the ransom were able to decrypt their data. This statistic should convince businesses and individuals of the importance of keeping current backups that are offline or in the cloud.</p>
<p>If a victim cannot recover backups, consulting a professional data recovery company is highly recommended. At Datarecovery.com, the recovery rates for ransomware cases are far higher than those in the CyberEdge survey. Knowing the landscape and having experience help ensure a successful recovery from a ransomware attack. Some strains have freely available decryptors, while others have coding issues that prevent even the attacker from decrypting files. Knowing which avenues to pursue saves time and increases the odds of a successful recovery.</p>
<p><strong>Survey respondents listed &#8220;lack of skilled personnel&#8221; as the greatest barrier to defending against cyberthreats.</strong></p>
<p>In past surveys, &#8220;low security awareness among employees&#8221; has topped that list, but a skilled personnel shortage has slowly climbed the ranks over the past five years. Poor security awareness still placed second as a barrier to IT security (which is concerning, given how long it&#8217;s been an issue).</p>
<p>Overall, the survey showed positive as well as negative trends. Many perennial threats remain: mobile devices and poorly trained employees continue to be security challenges. On the other hand, the number of successful cyberattacks decreased for the first time in five years and security budgets are higher than they&#8217;ve ever been. More than anything, the CyberEdge report reminds us that good IT security requires constant vigilance and adaptation to new threats.</p>
<p>The post <a href="https://datarecovery.com/rd/half-ransomware-payments-resulted-decrypted-files/">Only Half of Ransomware Payments Resulted in Decrypted Files</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SamSam Ransomware Infects CDOT</title>
		<link>https://datarecovery.com/rd/samsam-ransomware-infects-cdot/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Mon, 19 Mar 2018 16:17:14 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Data Recovery News]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5719</guid>

					<description><![CDATA[<p>SamSam ransomware has infected thousands of computers at the Colorado Department of Transportation. <a href="https://www.denverpost.com/2018/02/21/samsam-virus-ransomware-cdot/">Over 2,000 employee computers</a> were shut down to stop the spread of the malware after it was discovered on Feb. 21, and systems are still not back...</p>
<p>The post <a href="https://datarecovery.com/rd/samsam-ransomware-infects-cdot/">SamSam Ransomware Infects CDOT</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-full wp-image-5728 aligncenter" src="https://datarecovery.com/wp-content/uploads/2018/03/CDOT-logo-5.png" alt="CDOT logo" width="693" height="190" srcset="https://datarecovery.com/wp-content/uploads/2018/03/CDOT-logo-5.png 693w, https://datarecovery.com/wp-content/uploads/2018/03/CDOT-logo-5-300x82.png 300w" sizes="auto, (max-width: 693px) 100vw, 693px" /></p>
<p>SamSam ransomware has infected thousands of computers at the Colorado Department of Transportation. <a href="https://www.denverpost.com/2018/02/21/samsam-virus-ransomware-cdot/">Over 2,000 employee computers</a> were shut down to stop the spread of the malware after it was discovered on Feb. 21, and systems are still not back online.</p>
<p>Office of Information Technology chief technology officer David McCurdy released a statement shortly after the attack that said, “This ransomware virus was a variant and the state worked with its antivirus software provider to implement a fix today. The state has robust backup and security tools and has no intention of paying ransomware. Teams will continue to monitor the situation closely and will be working into the night.”</p>
<p><strong>SamSam is a strain of ransomware that targeted hospitals and others throughout January.</strong></p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-5726 alignright" src="https://datarecovery.com/wp-content/uploads/2018/03/samsam-ransomware-graphic05.png" alt="SamSam ransomware skull-and-crossbones" width="360" height="240" srcset="https://datarecovery.com/wp-content/uploads/2018/03/samsam-ransomware-graphic05.png 360w, https://datarecovery.com/wp-content/uploads/2018/03/samsam-ransomware-graphic05-300x200.png 300w" sizes="auto, (max-width: 360px) 100vw, 360px" /></p>
<p>An Indiana hospital, Hancock Health, <a href="https://datarecovery.com/rd/indiana-hospital-pays-55000-get-rid-ransomware/">paid a $55,000 ransom</a> to restore files and functionality after SamSam infected its servers. Even though the hospital claimed to have complete backups of encrypted files, administrators chose to pay the ransom to avoid costly delays in restoring their systems.</p>
<p><a href="https://www.bleepingcomputer.com/news/security/samsam-ransomware-hits-colorado-dot-agency-shuts-down-2-000-computers/">Security researchers</a> say that the group behind SamSam uses a brute-force attack on Remote Desktop Protocol (RDP) connections to gain access to internal networks. Then, hackers manually install the ransomware, which begins encrypting files. To protect against SamSam, <a href="https://www.bleepingcomputer.com/news/security/samsam-ransomware-hits-hospitals-city-councils-ics-firms/">researchers warn</a> that any computers open to remote RDP connections should have strong and unique passwords.</p>
<p>SamSam was also the culprit behind attacks on <a href="https://www.scmagazine.com/samsam-ransomware-continues-to-wreak-havoc-on-infrastructure/article/738983/">Allscripts</a>, <a href="http://wane.com/2018/01/18/ransomware-attack-targets-adams-memorial-hospital/">Adams Memorial Hospital</a>, <a href="http://buffalonews.com/2017/05/20/ecmc-got-hacked-cyber-extortionists/">Erie County Medical Center</a>, and the city of <a href="http://www.daily-times.com/story/news/local/farmington/2018/01/18/farmington-recovering-after-ransomware-attack/1044845001/">Farmington, New Mexico</a>. <a href="https://blog.barkly.com/samsam-ransomware-2018-campaign-hospital-attacks">Security experts</a> believe that these attacks were carried out by a single group of hackers.</p>
<p><strong>CDOT continues with daily work the old-fashioned way.</strong></p>
<p>“Our critical systems, our road operations, traffic operation systems are still online. We still have people on the road plowing and doing construction,” CDOT spokesperson Amy Ford <a href="https://www.denverpost.com/2018/02/26/samsam-ransomware-virus-cdot/">told the </a><a href="https://www.denverpost.com/2018/02/26/samsam-ransomware-virus-cdot/"><em>Denver Post</em></a>. “The things we have changed a little bit is we’ve had some business bids in the process of being done and we’ve extended times and dates. And we’re working with our contractors.”</p>
<p>The incident demonstrates the difficulties of recovering from a ransomware attack. Even though CDOT backed up their data, they are beginning their second week offline. Mecklenburg County, North Carolina <a href="http://www.charlotteobserver.com/news/local/article188302469.html">faced a similar slog</a> after a ransomware called LockCrypt infected county government servers. Officials spent well over a month <a href="https://www.mecknc.gov/news/Pages/Countywide-system-outage.aspx">scrambling to restore services</a> after that incident.</p>
<p>Ford summarized the frustrating but manageable limbo that CDOT is currently in.</p>
<p>“No one is back online. What we’re doing is working offline. All our critical services are still online — cameras, variable message boards, CoTrip, alerts on traffic. They are running on separate systems,” Ford said. “The message I’m sharing is CDOT operated for a long time without computers, so we’ll use pen and paper.”</p>
<p>The post <a href="https://datarecovery.com/rd/samsam-ransomware-infects-cdot/">SamSam Ransomware Infects CDOT</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>2017 Ransomware Recap</title>
		<link>https://datarecovery.com/rd/2017-ransomware-recap/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Thu, 04 Jan 2018 16:23:38 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Data Recovery News]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5635</guid>

					<description><![CDATA[<p>Ransomware became a household name in 2016. As hackers extorted ransoms from hospitals, universities, and other groups in return for files, the public became aware of how vulnerable devices are in this connected age.<br />
Even with the awareness of this...</p>
<p>The post <a href="https://datarecovery.com/rd/2017-ransomware-recap/">2017 Ransomware Recap</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Ransomware became a household name in 2016. As hackers extorted ransoms from hospitals, universities, and other groups in return for files, the public became aware of how vulnerable devices are in this connected age.</p>
<p>Even with the awareness of this threat, companies and individuals couldn&#8217;t stop the onslaught of ransomware attacks in 2017. This year has seen a steady drizzle of new ransomware variants punctuated by three large-scale attacks that used hacking tools from our own National Security Agency.</p>
<p>Because of ransomware attacks, two companies estimated their losses in the hundreds of millions of dollars and Britain&#8217;s National Health Service diverted ambulances and cancelled operations until they regained control of their computers. In addition to the major attacks, the underground market for smaller-scale operations continued to boom, and open-source ransomware gave hackers a head start. Here&#8217;s how the big events of 2017 went down.</p>
<h3><img loading="lazy" decoding="async" class="alignright size-medium wp-image-4715" src="https://datarecovery.com/wp-content/uploads/2017/01/st-louis-public-library-exterior-500-300x199.jpg" alt="st louis public library, exterior at night" width="300" height="199" srcset="https://datarecovery.com/wp-content/uploads/2017/01/st-louis-public-library-exterior-500-300x199.jpg 300w, https://datarecovery.com/wp-content/uploads/2017/01/st-louis-public-library-exterior-500.jpg 500w" sizes="auto, (max-width: 300px) 100vw, 300px" />St. Louis Public Library</h3>
<p>When staff arrived to work on Thursday, Jan. 19, they were greeted with locked computer screens throughout all branches of the St. Louis Public Library. <a href="https://datarecovery.com/rd/st-louis-public-library-grinds-halt-due-ransomware-attack/">Hackers had exploited a vulnerability</a> in a library voicemail server and locked 700 staff and public computers. The attackers demanded $34,000 in bitcoin to restore the computers.</p>
<p>The library refused to pay and began furiously working to restore services. Finally, on Jan. 30, they were able to <a href="https://www.slpl.org/news/an-update-on-the-ransomware-attack-against-slpl/">announce that all computers</a> used by the public were fully restored. Enhancements to the library system&#8217;s cybersecurity remains an ongoing project.</p>
<h3>Microsoft Releases Eternal Blue Patch</h3>
<p>On March 14, Microsoft issued a <a href="https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2017/ms17-010">critical security bulletin</a> for a vulnerability in all unsupported versions of Windows. The reason? The NSA had discovered a security flaw in Windows operating systems and added it to the agency&#8217;s stockpile of cyber weapons. A group called the <a href="https://www.theatlantic.com/technology/archive/2017/05/shadow-brokers/527778/">Shadow Brokers</a> accessed and leaked this stockpile, giving hackers powerful tools for wreaking havoc.</p>
<p>By installing Microsoft&#8217;s patch, users protected themselves from the vulnerability that the NSA discovered (which was known as Eternal Blue). Unfortunately, those who did not patch their operating systems would fall victim to cyber attacks in the coming months when the NSA exploit was paired with ransomware and unleashed.</p>
<h3>WannaCry</h3>
<p>The first attack that paired ransomware with Eternal Blue was WannaCry. The attack initially occurred in Asia on May 12 and quickly spread to more than 230,000 devices. Infected computers spread the ransomware to other machines on the same network as well as random computers over the internet.</p>
<p>A <a href="https://www.malwaretech.com/2017/05/how-to-accidentally-stop-a-global-cyber-attacks.html">security researcher</a> discovered a kill switch which stopped the spread, but more than 300,000 computers had already been infected. Companies and organizations affected by the attack include Britain&#8217;s <a href="http://www.bbc.com/news/technology-41753022">National Health Service</a>, <a href="https://www.mercurynews.com/2017/05/12/fedex-hit-as-nsa-linked-ransomware-spreads-around-the-world/">FedEx</a>, <a href="https://www.reuters.com/article/us-honda-cyberattack-idUSKBN19C0EI">Honda</a>, <a href="http://money.cnn.com/2017/05/15/technology/ransomware-whos-been-hit/index.html">Hitachi</a>, <a href="http://www.businessinsider.com/telefonica-and-other-firms-have-been-infected-by-wannacry-malware-2017-5">Telefónica</a>, and dozens more.</p>
<p><img loading="lazy" decoding="async" class="alignright size-medium wp-image-5631" src="https://datarecovery.com/wp-content/uploads/2017/12/north-korea-wannacry02-300x200.jpg" alt="north korea flag wannacry ransomware virus" width="300" height="200" srcset="https://datarecovery.com/wp-content/uploads/2017/12/north-korea-wannacry02-300x200.jpg 300w, https://datarecovery.com/wp-content/uploads/2017/12/north-korea-wannacry02-768x512.jpg 768w, https://datarecovery.com/wp-content/uploads/2017/12/north-korea-wannacry02.jpg 960w" sizes="auto, (max-width: 300px) 100vw, 300px" />While an unprecedented number of machines were infected, the attackers received relatively little money from ransom payments. Just <a href="http://money.cnn.com/2017/08/03/technology/wannacry-bitcoin-ransom-moved/index.html">$140,000 in bitcoin</a> was withdrawn from the three accounts associated with the attack.</p>
<p>In the months following the attack, many pointed fingers at North Korea&#8217;s cyber unit as the originator of the attacks. Finally, in a Dec. 18 <a href="https://www.wsj.com/articles/its-official-north-korea-is-behind-wannacry-1513642537">op-ed piece</a>, a Trump adviser officially declared North Korea responsible for the attack.</p>
<h3>Petya, NotPetya, Nyetna</h3>
<p>Whatever you call it, this attack wreaked havoc and proved that not everyone learned a lesson from the WannaCry attack. NotPetya targeted the same Windows security flaw that Microsoft provided a patch for (and that WannaCry exploited).</p>
<p>Ground zero for this attack was Ukraine, where a popular piece of tax-filing software, MEDoc, <a href="http://www.bbc.com/news/technology-40428967">spread NotPetya</a> to businesses and government organizations. Soon, NotPetya moved beyond Ukraine&#8217;s borders and devastated international businesses, such as <a href="http://www.computerweekly.com/news/450426854/NotPetya-attack-cost-up-to-15m-says-UK-ad-agency-WPP">advertising company WPP</a>, <a href="https://www.ft.com/content/1b5f863a-624c-11e7-91a7-502f7ee26895">law firm DLA Piper</a>, <a href="https://www.theregister.co.uk/2017/08/16/notpetya_ransomware_attack_cost_us_300m_says_shipping_giant_maersk/">shipping giant Maersk</a>, and <a href="https://www.theregister.co.uk/2017/09/20/fedex_notpetya_damages/">FedEx</a>. Both Maersk and FedEx estimated their losses from the attack to be around $300 million.</p>
<p>Initially, analysts blamed a ransomware called Petya for the cyber attack. However, <a href="https://securelist.com/expetrpetyanotpetya-is-a-wiper-not-ransomware/78902/">security experts</a> make a <a href="http://tass.com/world/972758">convincing case</a> that NotPetya is a wiper (meaning the intent was to destroy files, not hold them hostage) and that the <a href="https://blog.comae.io/petya-2017-is-a-wiper-not-a-ransomware-9ea1d8961d3b">attackers could not decrypt a victim&#8217;s files</a> even if they wanted to.</p>
<p>So, why would an attacker disguise a wiper as ransomware? Ukraine&#8217;s security service (SBU) <a href="https://www.theregister.co.uk/2017/07/04/sbu_claims_russia_was_behind_notpetya/">blames Russia</a>. Since the downfall of the Soviet Union in 1991, the two countries have had periods of tension. In 2014, Ukrainian voters ousted their pro-Russia president <a href="http://www.bbc.com/news/world-europe-25182830">Viktor Yanukovych</a>. Shortly after, Russia annexed Crimea, a Ukrainian peninsula, and the international community responded with heavy sanctions against Russia.</p>
<p>This may be more geopolitical history than you wanted to know, but the moral of the story is: cyber wars between nation-states can spill out into the general public. If NotPetya was in fact intended to cripple Ukraine&#8217;s infrastructure, then all those thousands of infected computers throughout the rest of the world were simply collateral damage. Welcome to the 21st century.</p>
<h3>Bad Rabbit</h3>
<p>Bad Rabbit was the ransomware used in the third major international attack of 2017. Compared to the massive disruptions and economic costs of WannaCry and NotPetya, Bad Rabbit was a mere nuisance. But for those affected, including Kiev&#8217;s metro system, Odessa&#8217;s airport, and Russian media group Interfax, the ransomware caused major disruptions. After its website went down, <a href="https://www.theguardian.com/technology/2017/oct/25/bad-rabbit-game-of-thrones-ransomware-europe-notpetya-bitcoin-decryption-key">Interfax took to publishing news stories</a> on Facebook until the site was restored.</p>
<p>Researchers believe the same attackers may be responsible for NotPetya and Bad Rabbit. There are similarities in the codes of NotPetya and Bad Rabbit, and <a href="https://www.theguardian.com/technology/2017/oct/25/bad-rabbit-game-of-thrones-ransomware-europe-notpetya-bitcoin-decryption-key">the same web servers were used</a> to distribute the initial software in both cases.</p>
<p>Bad Rabbit did not use the Eternal Blue exploit, though it used a different leaked NSA tool called Eternal Romance. Ukrainian state cyber police <a href="https://blog.knowbe4.com/bad-rabbit-ransomware-attack-was-hiding-a-spear-phishing-campaign">claimed that the ransomware attack</a> was used as cover to steal financial information from targeted Ukrainian companies.</p>
<h3>Ransomware-as-a-Service</h3>
<p>If 2016 put ransomware on the map, 2017 established it in the marketplace. Ransomware-as-a-service (RaaS) has existed since at least 2015, but there are now more opportunities than ever for someone with little technical skill to buy ransomware from the dark web. Here&#8217;s how it works.</p>
<p>A customer either pays a subscription to or agrees to share a percentage of ransom money with the ransomware developer. The customer can then launch an attack on the targets of his choosing. <a href="https://nakedsecurity.sophos.com/2017/12/13/5-ransomware-as-a-service-raas-kits-sophoslabs-investigates/">Slicker RaaS variants</a> have user-friendly dashboards to allow even the most technologically novice to launch cyber attacks.</p>
<p>A <a href="https://www.carbonblack.com/wp-content/uploads/2017/10/Carbon-Black-Ransomware-Economy-Report-101117.pdf">report from Carbon Black</a> found a 2,502 percent increase in ransomware for sale on the dark web from 2016 to 2017. The same report discovered 45,000 listings for RaaS products. With that kind of competition, expect the products to become even more sophisticated and user-friendly in the 2018.</p>
<h3>Open Source Ransomware</h3>
<p><img loading="lazy" decoding="async" class="size-medium wp-image-5328 alignnone" src="https://datarecovery.com/wp-content/uploads/2017/06/hidden-tear-ransomware-ascii-art2-300x158.png" alt="Hidden Tear Ransomware GitHub info" width="300" height="158" srcset="https://datarecovery.com/wp-content/uploads/2017/06/hidden-tear-ransomware-ascii-art2-300x158.png 300w, https://datarecovery.com/wp-content/uploads/2017/06/hidden-tear-ransomware-ascii-art2.png 530w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>Another cause for the proliferation of ransomware is the posting of open source code. <a href="https://datarecovery.com/rd/hidden-tear-ransomware-still-wreaking-havoc/">Hidden Tear</a> was the first such ransomware to be posted freely on the internet. The developer, Utju Sen, claimed that he shared it for educational purposes.</p>
<p>Sen built several backdoors into the code so that anyone affected by it could decrypt their files. Unfortunately, hackers have taken his code and closed those backdoors in order to make more functional ransomware. Hackers have since created at least a <a href="http://news.softpedia.com/news/new-open-source-linux-ransomware-shows-infosec-community-divide-508669.shtml">dozen ransomware families</a> (8lock8, Blocatto, Cryptear, Fakben, GhostCrypt, Globe, Hi Buddy!, Job Crypter, KryptoLocker, MireWare, PokemonGO, and Sanction) based on Hidden Tear.</p>
<p>And Sen&#8217;s Hidden Tear isn&#8217;t the only example. Others have created open-source ransomware ostensibly to improve ransomware detection and prevention. However, most security professionals have more sophisticated means of understanding and detecting malware. That makes these source codes a head start for criminals and not much more.</p>
<h2>Ransomware in the New Year</h2>
<p>Several large security companies have released reports with their predictions for the new year, and the message is clear. If you or your business use the internet, ransomware will continue to be a threat.</p>
<p><a href="https://www.sophos.com/en-us/medialibrary/PDFs/technical-papers/malware-forecast-2018.pdf?la=en">One firm predicts</a> that the combination of ransomware as a service (like <a href="https://datarecovery.com/rd/cerber-ransomware-infection-decryption-services/">Cerber</a>) and the resurgence of worms will lead to a surge in attacks and infections. Because hackers now have access to a trove of NSA tools, expect to see attacks similar to WannaCry again in 2018.</p>
<p>We can also expect to see <a href="https://researchcenter.paloaltonetworks.com/2017/12/2018-predictions-recommendations-ransomware-plague-just-beginning/">more attacks on Mac computers</a>. <a href="https://datarecovery.com/rd/keranger-ransomware-infection-decryption-services/">Keranger</a> was the first ransomware to target a Mac OS, and it did so with limited success. However, Mac users remain a lucrative target for hackers, who likely haven&#8217;t given up in their attempts to infect this relatively untapped group.</p>
<h2>What You Can Do</h2>
<p>Security experts recommend a multi-pronged approach to protecting yourself from ransomware. Most importantly, keeping multiple copies of current backups will ensure that you never have to pay a ransom.</p>
<p>Avoid suspicious attachments and links (and teach everyone who uses your network to do the same) to reduce the chances of downloading malware. Keep all software up to date and rely on reputable antivirus software to give you further protection.</p>
<p>The massive global attacks of 2017 showed that everyone from individual computer users to multi-national corporations are vulnerable. Following the above practices (and ensuring that anyone who uses your computer does too) will protect you from the costly headache of ransomware.</p>
<p>The post <a href="https://datarecovery.com/rd/2017-ransomware-recap/">2017 Ransomware Recap</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ransomware Market Expands as Healthcare Industry Continues Feeling the Effects</title>
		<link>https://datarecovery.com/rd/ransomware-market-expands-healthcare-industry-continues-feeling-effects/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Wed, 25 Oct 2017 17:44:50 +0000</pubDate>
				<category><![CDATA[Data Recovery News]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5452</guid>

					<description><![CDATA[<p>A <a href="https://www.carbonblack.com/wp-content/uploads/2017/10/Carbon-Black-Ransomware-Economy-Report-101117.pdf">computer security company determined</a> that the dark-web ransomware market has grown by 2,500 percent from 2016 to 2017. The company, Carbon Black, credits that expansion to the relative anonymity of Bitcoin and Tor as well as the lucrative return-on-investment...</p>
<p>The post <a href="https://datarecovery.com/rd/ransomware-market-expands-healthcare-industry-continues-feeling-effects/">Ransomware Market Expands as Healthcare Industry Continues Feeling the Effects</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A <a href="https://www.carbonblack.com/wp-content/uploads/2017/10/Carbon-Black-Ransomware-Economy-Report-101117.pdf">computer security company determined</a> that the dark-web ransomware market has grown by 2,500 percent from 2016 to 2017. The company, Carbon Black, credits that expansion to the relative anonymity of Bitcoin and Tor as well as the lucrative return-on-investment that ransomware offers.</p>
<p>“It’s like some sort of gold rush,” Limor Kessem, executive security adviser for IBM Security, <a href="https://www.nbcnews.com/tech/security/ransomware-now-billion-dollar-year-crime-growing-n704646">told NBC News</a>. “Cybercriminals are using ransomware to bring extortion to the masses and more criminals are now doing it because they’re interested in getting a piece of the action.”</p>
<p>The news is particularly worrisome for the healthcare industry, which is a frequent victim of ransomware. It&#8217;s not clear if hackers intentionally target hospitals and medical centers, but because doctors need access to crucial files, medical organizations feel more pressure to pay ransoms to restore data.</p>
<h2>Arkansas Oral and Facial Surgery Center is the latest victim from the medical industry.</h2>
<p>The healthcare organization <a href="https://www.scmagazine.com/128000-arkansas-oral-facial-surgery-center-patients-compromised/article/698227/">discovered the attack</a> on July 26, 2017, but only recently sent an explanation to its patients. In <a href="https://ofscenter.com/notice-to-patients/">the notice</a>, the medical practice explains that ransomware rendered three weeks worth of imaging files, x-rays, and other documents inaccessible.</p>
<p>The <a href="https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf">U.S. Department of Health and Human Services</a> lists the incident as a case currently under investigation and reports that 128,000 individuals may have been affected. The Arkansas Oral and Facial Surgery Center did not disclose information about a ransom payment, but did say that they reported the case to the FBI.</p>
<h2>A number of factors make the healthcare industry a frequent victim of ransomware attacks.</h2>
<p>Perhaps the biggest factor is that hospitals and other medical centers need immediate access to files. This makes them more likely to pay a hefty ransom, as happened with the <a href="http://www.latimes.com/business/technology/la-me-ln-hollywood-hospital-bitcoin-20160217-story.html">Hollywood Presbyterian Medical Center</a>.</p>
<p>A <a href="https://datarecovery.com/rd/locky-ransomware-infection-decryption-services/">Locky ransomware</a> attack froze up services at Hollywood Presbyterian in February 2016. The medical group quickly paid $17,000 to its attackers in order to receive a decryption key and regain access to their files.</p>
<p>In May 2017, <a href="http://www.cnn.com/2017/05/14/opinions/wannacrypt-attack-should-make-us-wanna-cry-about-vulnerability-urbelis/index.html">WannaCry ransomware</a> affected hundreds of thousands of computers in 150 countries. The most prominent victim was Britain&#8217;s National Health Service (NHS), whose services were severely disrupted by the incident.</p>
<h2>The NHS incident laid bare another factor that makes medical centers more susceptible to ransomware attacks.</h2>
<p>Many healthcare organizations use medical devices that run on older, unsupported operating systems. Because the systems no longer receive patches, hackers can find and exploit their vulnerabilities.</p>
<p>During the WannaCry attack, <em>Forbes</em> <a href="https://www.forbes.com/sites/thomasbrewster/2017/05/17/wannacry-ransomware-hit-real-medical-devices/">reported</a> that some medical facilities in the U.S. had radiology equipment compromised by the ransomware. Of course, healthcare facilities are reticent to say what operating systems they use, but clearly, many are relying on older systems.</p>
<p>This is horrifying to computer security experts, but it&#8217;s a simple matter of economics for hospitals. A ransomware attack is costly, but so is replacing a building full of medical equipment and retraining employees every time an operating system becomes obsolete.</p>
<h2>Operating systems are now adding defenses against ransomware, but that doesn&#8217;t protect everyone.</h2>
<p>Microsoft has been beefing up their anti-ransomware capabilities and <a href="https://blogs.technet.microsoft.com/mmpc/2017/06/08/windows-10-creators-update-hardens-security-with-next-gen-defense/">claims there have been no successful attacks</a> against their &#8220;most hardened&#8221; operating system, <a href="https://www.microsoft.com/en-us/windows/windows-10-s">Windows 10 S</a>. That&#8217;s great news for those who have up-to-date software, but leaves behind those organizations running unsupported systems.</p>
<p>For those organizations, backing up files offline and educating employees on phishing schemes are crucial to avoiding ransomware. Experts say that <a href="https://www.knowbe4.com/security-awareness-training-features/">security awareness training</a> for employees can dramatically decrease the rates of clicking on scam emails.</p>
<p>Training employees and using more secure operating systems will make it harder for successful ransomware attacks. Unfortunately, with the malware market burgeoning, hackers will continue searching for vulnerabilities in software and in internet users.</p>
<p>The post <a href="https://datarecovery.com/rd/ransomware-market-expands-healthcare-industry-continues-feeling-effects/">Ransomware Market Expands as Healthcare Industry Continues Feeling the Effects</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The 4 Most Game-Changing Ransomware Attacks</title>
		<link>https://datarecovery.com/rd/4-game-changing-ransomware-attacks/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Mon, 09 Oct 2017 22:06:07 +0000</pubDate>
				<category><![CDATA[Data Recovery News]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5444</guid>

					<description><![CDATA[<p>Every week, new strains of ransomware infect computers or are spotted by security researchers while still in development. Most of them are small-scale operations that attract little attention.<br />
Every once in a while, a new malware will make headlines based...</p>
<p>The post <a href="https://datarecovery.com/rd/4-game-changing-ransomware-attacks/">The 4 Most Game-Changing Ransomware Attacks</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Every week, new strains of ransomware infect computers or are spotted by security researchers while still in development. Most of them are small-scale operations that attract little attention.</p>
<p>Every once in a while, a new malware will make headlines based on some novel feature. The distributors of <a href="https://datarecovery.com/rd/popcorn-time-ransomware-new-era-malware/">Popcorn Time</a>, an in-dev ransomware, would decrypt a victim&#8217;s files if they infected two other victims who ended up paying.</p>
<p><a href="https://datarecovery.com/rd/jigsaw-ransomware-infection-decryption-services/">Jigsaw</a> used images from <em>Saw</em> to increase the intimidation factor and brand their otherwise nondescript malware. <a href="https://www.bleepingcomputer.com/news/security/the-philadelphia-ransomware-offers-a-mercy-button-for-compassionate-criminals/">Philadelphia</a> ransomware can be bought as a service and tweaked to fit an attacker&#8217;s specific needs. However, none of these have proven to be large players in the long run.</p>
<p>There are a handful of malicious programs that have changed the landscape of the ransomware world. Here are the four most revolutionary, game-changing ransomware strains and how they influenced their successors.</p>
<h2>The AIDS Trojan Horse: The Advent of Ransomware</h2>
<p>In 1989, an evolutionary biologist named <a href="https://www.theatlantic.com/technology/archive/2016/05/the-computer-virus-that-haunted-early-aids-researchers/481965/">Joseph Popp distributed 20,000 floppy disks</a> to AIDS researchers around the world. The disks contained a questionnaire that Popp claimed would help doctors determine a patient&#8217;s risk of developing the AIDS virus. In reality, Popp had hidden an early form of ransomware on the disks and was using a social engineering technique to spread it.</p>
<p>To avoid being pinpointed as the author of the malware, Popp wrote the code so that the ransomware lay dormant until an infected computer booted up 90 times. On that 90th boot, the virus encrypted the computer&#8217;s files and displayed a ransom note.</p>
<p>The <a href="https://www.knowbe4.com/aids-trojan">note instructed victims</a> to send $189 to a PO box in Panama, a country with infamously lax business laws. Few victims made payments and British authorities quickly arrested Popp and charged him with blackmail. He avoided jail time when a judge declared Popp mentally unfit to stand trial. In the meantime, a researcher named Jim Bates created a tool to restore victims&#8217; files by removing the virus and decrypting the files.</p>
<p><strong>What it changed: </strong>Popp&#8217;s malware had four characteristics that future ransomware developers and distributors would copy: a scaremongering note, a hard-to-track payment scheme, encryption of important files (albeit rudimentary and breakable), and the use of social engineering to trick victims into installing the malware themselves.</p>
<h2>CryptoLocker: Ransomware Modernizes and Scales</h2>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-4542" src="https://datarecovery.com/wp-content/uploads/2016/05/CryptoLocker-ransomware-encrypted-files-message.png" alt="CryptoLocker ransomware encrypted files message" width="432" height="336" srcset="https://datarecovery.com/wp-content/uploads/2016/05/CryptoLocker-ransomware-encrypted-files-message.png 432w, https://datarecovery.com/wp-content/uploads/2016/05/CryptoLocker-ransomware-encrypted-files-message-300x233.png 300w" sizes="auto, (max-width: 432px) 100vw, 432px" /></p>
<p>In September 2013 (almost 25 years after the first ransomware incident), the modern era of ransomware began. <a href="https://www.avast.com/c-cryptolocker">CryptoLocker spread through the Gameover ZeuS botnet</a> via infected email attachments.</p>
<p>The exact number of victims is unknown, but estimates suggest there were <a href="http://www.bbc.com/news/technology-28661463">500,000 people who lost data</a> because of CryptoLocker. This sophisticated crypto-ransomware may have been too successful for its own good, as the staggering number of victims prompted international cooperation to catch the attackers. The U.S. Department of Justice, the FBI, Europol, and others collaborated for <a href="https://en.wikipedia.org/wiki/Operation_Tovar">Operation Tovar</a>, which took down the Gameover ZeuS botnet and gained access to the decryption keys.</p>
<p>While all victims eventually had the opportunity to decrypt their data, it took nearly a year for law enforcement and security firms to create a tool for this purpose. The CryptoLocker attack was an early indication that ransomware had the potential to massively disrupt business and prevent access to data from thousands of miles away.</p>
<p><strong>What it changed: </strong>CryptoLocker showed the devastation that a large botnet could cause when it sends out millions of phishing emails infected with ransomware. The sophisticated encryption method also proved that ransomware could permanently prevent access to files when the decryption key was withheld.</p>
<h2>Hidden Tear: Open-Source Code Makes Ransomware Easy</h2>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-5326" src="https://datarecovery.com/wp-content/uploads/2017/06/hidden-tear-ransomware-ascii-art.png" alt="Hidden Tear Ransomware ASCII art" width="453" height="138" srcset="https://datarecovery.com/wp-content/uploads/2017/06/hidden-tear-ransomware-ascii-art.png 453w, https://datarecovery.com/wp-content/uploads/2017/06/hidden-tear-ransomware-ascii-art-300x91.png 300w" sizes="auto, (max-width: 453px) 100vw, 453px" /></p>
<p>Utju Sen was a Turkish programmer who <a href="https://www.tripwire.com/state-of-security/security-data-protection/cyber-security/hidden-tear-project-forbidden-fruit-is-the-sweetest/">created a ransomware called Hidden Tear</a>. Sen didn&#8217;t want to use the malware for financial gain, but he did want to share his creation. So, he made it freely available to download for educational purposes. Sen built several backdoors into the code so that any files encrypted by it could be decrypted.</p>
<p>Hackers quickly realized they could use Sen&#8217;s code for ransomware campaigns of their own. They also realized that they could tweak the code to close the backdoors. To make matters worse, some of the variants had changes to the code that made it difficult to decrypt—even if the attackers supplied the decryption key.</p>
<p>Variants of Hidden Tear continue showing up in new guises. In June 2017, a <a href="https://twitter.com/ChristiaanBeek/status/899557658071633920">McAfee engineer found</a> that nearly 30 percent of new ransomware strains were based on Hidden Tear.</p>
<p><strong>What it changed:</strong> Hidden Tear provided open-source code for programmers who have minimal skills to attack computers. Even inexperienced hackers who botch the code can wreak havoc and earn money (even if they can&#8217;t successfully decrypt encrypted files).</p>
<h2>WannaCry: With Help From the NSA, Ransomware Spreads Fast</h2>
<p>This sophisticated attack combined ransomware with a worm that targeted a vulnerability in older Microsoft Windows operating systems. The public was shocked to learn that the U.S. <a href="https://www.independent.co.uk/news/uk/home-news/nhs-cyber-attack-edward-snowden-accuses-nsa-not-preventing-ransomware-a7733941.html">National Security Agency had discovered</a> the vulnerability and created a hacking weapon out of it (known as an exploit) rather than report it to Microsoft.</p>
<p>The worm aspect of WannaCry allowed it to spread laterally to other computers on the same network. One of the hardest hit organizations was Britain&#8217;s National Health Service, <a href="https://www.theguardian.com/technology/2017/may/13/nhs-workers-and-patients-on-how-cyber-attack-has-affected-them">whose services were severely disrupted</a>. Germany&#8217;s national railway service, a Spanish telecom giant, and French carmaker Renault <a href="https://www.washingtonpost.com/business/economy/more-than-150-countries-affected-by-massive-cyberattack-europol-says/2017/05/14/5091465e-3899-11e7-9e48-c4f199710b69_story.html?utm_term=.784a9a090698">were all affected by the attack</a> as well.</p>
<p>The cryptoworm spread to over 150 countries over the course of 48 hours. The spread slowed when a <a href="https://www.ncsc.gov.uk/blog-post/finding-kill-switch-stop-spread-ransomware-0">security researcher Marcus Hutchins found a kill switch</a> in the malware&#8217;s code. <a href="https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/">Microsoft also took the unusual step</a> of providing a patch for their older, unsupported operating systems to prevent any further attacks using the NSA exploit.</p>
<p><strong>What it changed:</strong> The attack proved how quickly a combined ransomware/worm can spread—especially on networks using unsupported operating systems. Sadly, the Petya/Nyetna attack that occurred months later successfully <a href="https://krebsonsecurity.com/2017/06/petya-ransomware-outbreak-goes-global/">targeted the same vulnerability</a> on thousands of computers that still were not patched.</p>
<h2>What Comes Next?</h2>
<p>Many of the tactics used by the above strains of ransomware continue to be used today. Mass phishing campaigns conducted by botnets allow attackers to cast a wide net for potential victims. As email providers get better at detecting malware in attachments, hackers change their tactics to better hide it.</p>
<p>To protect your home or business from ransomware attacks, you don&#8217;t need to predict the exact method that hackers will use. Rather, protect yourself from any data loss situation by regularly backing up all essential data. Having reliable backups on media disconnected from your computer can save your data from ransomware attacks and the more mundane situations that might occur.</p>
<p>The post <a href="https://datarecovery.com/rd/4-game-changing-ransomware-attacks/">The 4 Most Game-Changing Ransomware Attacks</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Locky Creators Tweak Variants To Evade Detection</title>
		<link>https://datarecovery.com/rd/locky-creators-tweak-variants-evade-detection/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Wed, 04 Oct 2017 16:53:03 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Data Recovery News]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5438</guid>

					<description><![CDATA[<p>Locky ransomware first appeared in February 2016 using a simple but ingenious social engineering method. <a href="https://arstechnica.com/information-technology/2016/02/locky-crypto-ransomware-rides-in-on-malicious-word-document-macro/">The distributors sent thousands of emails</a> around the world with an infected Microsoft Word document that appeared as gibberish when opened.<br />
The message, &#8220;Enable macro...</p>
<p>The post <a href="https://datarecovery.com/rd/locky-creators-tweak-variants-evade-detection/">Locky Creators Tweak Variants To Evade Detection</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Locky ransomware first appeared in February 2016 using a simple but ingenious social engineering method. <a href="https://arstechnica.com/information-technology/2016/02/locky-crypto-ransomware-rides-in-on-malicious-word-document-macro/">The distributors sent thousands of emails</a> around the world with an infected Microsoft Word document that appeared as gibberish when opened.</p>
<p>The message, &#8220;Enable macro if the data encoding is incorrect,&#8221; would prod users into changing their settings. Those who turned on macros in Word initiated the ransomware&#8217;s installation process and became the first victims of Locky.</p>
<p>Since that first wave of infections, Locky has vanished and then reappeared repeatedly. The one constant is that it always returns with a new extension and a few tweaks to better evade antivirus software.</p>
<div id="attachment_4517" style="width: 604px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-4517" class="wp-image-4517 size-full" src="https://datarecovery.com/wp-content/uploads/2016/04/Locky-ransomware-message-screenshot2.png" alt="Locky ransomware message screenshot" width="594" height="407" srcset="https://datarecovery.com/wp-content/uploads/2016/04/Locky-ransomware-message-screenshot2.png 594w, https://datarecovery.com/wp-content/uploads/2016/04/Locky-ransomware-message-screenshot2-300x206.png 300w" sizes="auto, (max-width: 594px) 100vw, 594px" /><p id="caption-attachment-4517" class="wp-caption-text">A previous Locky version ransom message</p></div>
<h2>Ykcol Variant Uses 7z or 7zip Extension</h2>
<p>The latest incarnation of Locky is the ykcol variant (for those wondering about the unusual name, ykcol is locky backwards). More significant than the updated extension is an updated tactic. This variant is <a href="https://www.bleepingcomputer.com/news/security/locky-ransomware-switches-to-the-ykcol-extension-for-encrypted-files/">distributed in a 7z file</a>.</p>
<p>This file extension is probably unfamiliar to less techy computer users—it&#8217;s a format for highly compressed and encrypted files. Most computer users don&#8217;t even have the necessary software for unzipping such a file. Experts believe that the distributors hid the Locky variant in the obscure format to evade the filters of Gmail and other mail providers.</p>
<h2>Ykcol Is the Latest in a String of Variants</h2>
<p>From <a href="https://blog.malwarebytes.com/cybercrime/2017/08/locky-ransomware-returns-to-the-game-with-two-new-flavors/">February 2016 to September 2017</a>, Locky has morphed its .locky extension to .zepto, .odin, .shit, .thor, .aesir, .zzzzz, .osiris, .loptr, .diablo6, .lukitus, and finally, to .ykcol. None of these variants can be decrypted without the key, which only the distributors of the ransomware hold.</p>
<p>Locky has been a persistent threat over the last 18 months accounting for <a href="https://www.malwarebytes.com/pdf/white-papers/us-ransomware.pdf">14 percent of all ransomware detections globally</a> in fall of 2016. It has since overtaken <a href="https://datarecovery.com/rd/cerber-ransomware-infection-decryption-services/">Cerber</a> as the largest ransomware family. At times, the prolific ransomware appears to become inactive, but time and time again, it has reappeared with new features and distribution tactics.</p>
<h2>Who Created Locky?</h2>
<p>There are numerous clues, but no firm answers as to who created Locky. The ransomware has a flag that detects if a computer&#8217;s operating system uses the Russian language. <a href="https://securingtomorrow.mcafee.com/business/locky-ransomware-makes-comeback-new-diablo6-lukitus-variants/">If the OS is in Russian</a>, Locky and its variants will not infect the computer. On top of that evidence, the majority of the ransomware&#8217;s attacks have been traced to Russia.</p>
<p>Though experts believe that a Russian group is responsible for creating and distributing Locky, it&#8217;s unclear exactly who they are. Locky is one of the most sophisticated ransomware families, so its creators are certainly highly skilled.</p>
<h2>Attacks Continue at Huge Volumes</h2>
<p>In early September 2017, <a href="https://gbhackers.com/massive-locky-ransomware-campaign/">security experts at Appriver</a> detected 23 million spam messages containing Locky in a single 24-hour period. Clearly, the distributors are playing a numbers game. If only a miniscule fraction of those targeted download the ransomware, there will still be plenty of victims and potential ransom payments.</p>
<p>The subject lines of the spam emails contained words like &#8220;please print,&#8221; &#8220;documents,&#8221; or &#8220;photos.&#8221; The attackers attempt to lure in victims with curiosity over what may be attached to the email. Because of the overwhelming number of spam emails sent, it is more important than ever to scrutinize and verify attachments before downloading them.</p>
<p>Other security measures to avoid Locky and other ransomware include:</p>
<ul>
<li>Back up essential files frequently.</li>
<li>Patch all software when updates become available.</li>
<li>Use security software that detects ransomware behavior.</li>
<li>Enable extension viewing so you can see executable files hidden as other documents.</li>
</ul>
<p>Locky continues to evolve and other families of ransomware pose new threats every day. Use good internet hygiene and follow the above tips to avoid the costly effects of a ransomware infection.</p>
<p>The post <a href="https://datarecovery.com/rd/locky-creators-tweak-variants-evade-detection/">Locky Creators Tweak Variants To Evade Detection</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cracking Passwords: 11 Password Attack Methods (And How They Work)</title>
		<link>https://datarecovery.com/rd/cracking-passwords-11-password-attack-methods-work/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Mon, 18 Sep 2017 21:20:05 +0000</pubDate>
				<category><![CDATA[Data Recovery Knowledge]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[guide]]></category>
		<category><![CDATA[password]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5430</guid>

					<description><![CDATA[<p>At Datarecovery.com, we frequently recover lost passwords for everything from Word documents and RAR files to encrypted Linux volumes (LUKS encryption) and Bitcoin wallets. Our customers often ask about our methods; do we simply try every possible password, or is...</p>
<p>The post <a href="https://datarecovery.com/rd/cracking-passwords-11-password-attack-methods-work/">Cracking Passwords: 11 Password Attack Methods (And How They Work)</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-5432" src="https://datarecovery.com/wp-content/uploads/2017/09/word-cloud10.png" alt="Cracking password techniques word cloud" width="761" height="707" srcset="https://datarecovery.com/wp-content/uploads/2017/09/word-cloud10.png 761w, https://datarecovery.com/wp-content/uploads/2017/09/word-cloud10-300x279.png 300w" sizes="auto, (max-width: 761px) 100vw, 761px" /></p>
<p>At Datarecovery.com, we frequently recover lost passwords for everything from Word documents and RAR files to encrypted Linux volumes (LUKS encryption) and Bitcoin wallets. Our customers often ask about our methods; do we simply try every possible password, or is there more to it?</p>
<p>To put it simply: There&#8217;s more to it. Password recovery services require a solid understanding of the various possible password cracking methods used in modern cryptography. Our engineers work with our clients to choose an appropriate methodology, then use dedicated equipment to complete the crack as efficiently as possible.</p>
<p>Some of the common password cracking methods used by software password cracker tools <a href="https://hashcat.net/hashcat/">such as hashcat</a> are listed below. For more information or to discuss password recovery services, call 1-800-237-4200 to speak with a specialist.</p>
<p><strong>Brute-force attack &#8211;</strong> A brute-force attack exhaustively tries every possible combination of letters, numbers, and symbols to crack a password. It&#8217;s the simplest way to crack a password, but also the most ineffective, since it wastes a lot of time making unlikely guesses.</p>
<p>Most types of encryption effectively prevent a brute-force attack by using hashing algorithms to slow down password entry. Longer passwords can also defeat this technique. For example, a brute-force attack might take 5 minutes to crack a 9-character password, but 9 hours for a 10-character password, 14 days for 11 characters, and 3.9 years for 12 characters.</p>
<p>While we have specialized hardware that allows for extremely fast brute-force cracking, this technique is rarely effective.</p>
<p><strong>Dictionary attack </strong>&#8211; The name says it all: A dictionary attack enters every word in a dictionary as a password. This removes some of the randomness of a brute-force attack, reducing the amount of time needed to find the password—provided that the password is in the dictionary, of course.</p>
<p>Note that &#8220;dictionary&#8221; doesn&#8217;t literally refer to a simple English dictionary; the entries in a cryptography dictionary may include common substitutions (for instance, &#8220;4pple&#8221; for &#8220;apple&#8221;) and numeric entries.</p>
<p>A common example is a <em>rainbow-table attack. </em>A rainbow table is essentially a dictionary optimized for common hash values as well as passwords. A rainbow-table attack is, therefore, a dictionary attack, but with a specialized dictionary optimized for the cracking attempt.</p>
<p><strong>Combinator attack </strong>&#8211; This attack appends dictionary entries to other dictionary entries. It&#8217;s effective because users often choose passphrases that combine a few common, easy-to-remember phrases, for instance &#8220;password123.&#8221;</p>
<p>Let&#8217;s say that the dictionary for a combinator attack has the words &#8220;dog&#8221; and &#8220;cat.&#8221; The combinator would try &#8220;dogcat&#8221; and &#8220;catdog&#8221; as possible passwords. A combinator attack can be extraordinarily effective at cracking user-generated passphrases, but it&#8217;s not too effective for cracking machine-created passphrases.</p>
<p><strong>Fingerprint attack </strong>&#8211; This is a fairly new type of attack, and its method is fairly sophisticated. It breaks possible passphrases down into &#8220;fingerprints,&#8221; single- and multi-character combinations that a user might choose. For the word &#8220;dog,&#8221; the technique would create fingerprints including &#8220;d,&#8221; &#8220;o,&#8221; &#8220;g,&#8221; along with &#8220;do,&#8221; and &#8220;og.&#8221;</p>
<p>This can be an especially effective attack when a user remembers part of a password. However, due to its sophistication, it requires extraordinary computing power.</p>
<p><strong>Hybrid attack &#8211; </strong>This is a blend of a dictionary and a brute-force attack. It makes a dictionary attack stronger by placing a string of brute-force characters to the beginning or end of the dictionary entries.</p>
<p>For instance, &#8220;software&#8221; might be appended with &#8220;software001,&#8221; &#8220;software002,&#8221; &#8220;001software&#8221; and so on.</p>
<p><strong>Mask attack &#8211;</strong> Similar to a brute-force attack, but with rules to reduce the number of errant entries. It&#8217;s extremely useful if some of the characters are known, or if character types are known. For instance, if a user knows that his password has a capital letter at the beginning and three numbers at the end, the mask attack would be far more effective than a simple brute-force attack. The masks are often generated by the password cracker.</p>
<p><strong>Permutation attack &#8211;</strong> A permutation attack uses a dictionary, but each entry in the dictionary also generates permutations of itself. For the word &#8220;dog,&#8221; a permutation attack would create the candidates &#8220;god,&#8221; &#8220;ogd,&#8221; &#8220;odg,&#8221; &#8220;gdo,&#8221; and &#8220;dgo.&#8221;</p>
<p><strong>PRINCE attack &#8211; </strong>Stands for &#8220;PRobability INfinite Chained Elements.&#8221; The PRINCE attack uses an algorithm to try the most likely password candidates with a refined combinator attack. It creates chains of combined words by using a single dictionary.</p>
<p><strong>Rule-based attack &#8211;</strong> As the name implies, a rule-based attack uses rules to eliminate possibilities. It&#8217;s one of the more complex types of attacks, but the possibilities are effectively endless. A password recovery engineer could create any criteria necessary to weed out unlike or impossible guesses.</p>
<p><strong>Table-Lookup attack &#8211;</strong> Each word in a dictionary generates masks for a mask attack while creating new words by consulting a table. Simply put, it&#8217;s effective for guessing passwords when the user replaced one or more characters with numbers or symbols (for instance, &#8220;m$ney&#8221; instead of &#8220;money&#8221;).</p>
<p><strong>Toggle-Case attack &#8211; </strong>This attack creates every possible case combination for each word in a dictionary. The password candidate &#8220;do&#8221; would also generate &#8220;Do&#8221; and &#8220;dO.&#8221;</p>
<p>If you&#8217;ve lost your password or if you need access to an encrypted file that you legally own, Datarecovery.com can help. Call us at 1-800-237-4200 to get started.</p>
<p>The post <a href="https://datarecovery.com/rd/cracking-passwords-11-password-attack-methods-work/">Cracking Passwords: 11 Password Attack Methods (And How They Work)</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>EV Ransomware Targets WordPress Sites</title>
		<link>https://datarecovery.com/rd/ev-ransomware-targets-wordpress-sites/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Tue, 12 Sep 2017 16:53:25 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Data Recovery News]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5427</guid>

					<description><![CDATA[<p>A new strain of ransomware <a href="https://www.mysonicwall.com/sonicalert/searchresults.aspx?ev=article&#38;id=1073">targets websites created through WordPress</a>. The malware encrypts a web server&#8217;s files making them inaccessible. Experts have named the malicious software &#8220;EV&#8221; because it appends files with &#8220;.ev&#8221; after encrypting them.<br />
The ransomware is...</p>
<p>The post <a href="https://datarecovery.com/rd/ev-ransomware-targets-wordpress-sites/">EV Ransomware Targets WordPress Sites</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A new strain of ransomware <a href="https://www.mysonicwall.com/sonicalert/searchresults.aspx?ev=article&amp;id=1073">targets websites created through WordPress</a>. The malware encrypts a web server&#8217;s files making them inaccessible. Experts have named the malicious software &#8220;EV&#8221; because it appends files with &#8220;.ev&#8221; after encrypting them.</p>
<h2>The ransomware is also known as Ronggolawe or AwesomeWare.</h2>
<p>Indonesian hackers originally uploaded the malware to GitHub under the name AwesomeWare. The developers claimed that the open-source malware was for educational purposes, but before long, security companies <a href="https://www.imperva.com/blog/2017/08/ronggolawe-ransomware-how-to-block-it/">started detecting attacks</a> using the malware on WordPress sites.</p>
<p>What sets this ransomware apart from others is that it targets web servers as opposed to the more usual target of Windows workstations. The attackers attempt to encrypt the site owner&#8217;s files and deny them access to their site.</p>
<p>The specific attack vector for EV ransomware is unknown. Because WordPress allows a wide variety of third-party plugins, there are many possible vulnerabilities. However, WordPress users can still protect themselves with a couple of precautions.</p>
<h2>WordPress users should employ a web application firewall (WAF) and maintain backups offline.</h2>
<p>A WAF can prevent hackers from uploading the malicious .php files used to infect web servers with EV ransomware. A good WAF protects against known malware and blocks any suspicious files from being uploaded.</p>
<p>Prevention of ransomware is preferable, but keeping current backups of files will protect your website if malware does encrypt your files. These copies should be kept offline or in the cloud so that they are isolated from a ransomware infection.</p>
<p>Restoring a WordPress website through backups may be the only viable option if EV ransomware encrypts your files. Because the ransomware is not fully functional, it can encrypt, but not decrypt, files. Even if a victim pays the ransom and receives a decryption key, a data recovery expert would be necessary to fix the broken code and decrypt the files.</p>
<h2>An Indonesian hacking group is linked to the malware.</h2>
<p>A group known as Bug7sec uploaded the source code that EV ransomware uses. On the group&#8217;s <a href="https://www.facebook.com/search/str/Bug7sec/keywords_blended_featured_posts?esd=eyJlc2lkIjoiUzpfSTg0MzE1Njk1OTExMjczMToxNDYwMDQ3MDA3NDIzNzIwIiwicHNpZCI6eyI4NDMxNTY5NTkxMTI3MzE6MTQ2MDA0NzAwNzQyMzcyMCI6IlV6cGZTVGcwTXpFMU5qazFPVEV4TWpjek1Ub3hORFl3TURRM01EQTNOREl6TnpJdyJ9LCJjcmN0IjoidGV4dCIsImNzaWQiOiI3Yjc2MGRmN2VkNDRjYjMzZjJmYTk1YTRkZDM5YzJlZSJ9">Facebook page</a>, Bug7sec also takes credit for two other strains of ransomware that operate similarly to EV. Their motivation is unclear since they are offering the code for free.</p>
<p>This new threat highlights the importance of using good internet hygiene and security software. Hackers will continue to search for new vulnerabilities as old ones are patched. Keep your website safe by regularly updating plugins, using a web application firewall, and maintaining current backups in an isolated location.</p>
<p>The post <a href="https://datarecovery.com/rd/ev-ransomware-targets-wordpress-sites/">EV Ransomware Targets WordPress Sites</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 127/175 objects using Memcached
Page Caching using Disk: Enhanced 
Minified using Disk

Served from: datarecovery.com @ 2026-04-13 19:15:46 by W3 Total Cache
-->