<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>virus Archives - Datarecovery.com</title>
	<atom:link href="https://datarecovery.com/tag/virus/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description></description>
	<lastBuildDate>Thu, 19 Apr 2018 20:22:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>SamSam Ransomware Infection And Decryption Services</title>
		<link>https://datarecovery.com/rd/samsam-ransomware-infection-decryption-services/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Wed, 11 Apr 2018 20:15:49 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5761</guid>

					<description><![CDATA[<p>SamSam ransomware (also known as Samas, SamSamCrypt, and MSIL) is a quickly evolving type of malware that targets hospitals, municipalities, and other large organizations. After installing malicious software through compromised servers, the hackers encrypt network files, making them unusable, and...</p>
<p>The post <a href="https://datarecovery.com/rd/samsam-ransomware-infection-decryption-services/">SamSam Ransomware Infection And Decryption Services</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>SamSam ransomware (also known as Samas, SamSamCrypt, and MSIL) is a quickly evolving type of malware that targets hospitals, municipalities, and other large organizations. After installing malicious software through compromised servers, the hackers encrypt network files, making them unusable, and demand a ransom.</p>
<p>If SamSam has infected your computer or network, turn off computer(s), disconnect all media, and call Datarecovery.com at 1-800-237-4200. Our ransomware experts will assess your situation and offer a plan to restore your files and remove SamSam.</p>
<h2>What is SamSam Ransomware (And How Does It Work)?</h2>
<p>SamSam is a type of crypto-ransomware, which means the malware encrypts files in such a way that only the attacker can decrypt them. If a victim doesn&#8217;t pay the ransom or have current backups, recovery from SamSam is extremely difficult. Hospitals and city governments have found that a SamSam attack cripples the organization&#8217;s ability to function normally, leading some to pay the ransom.</p>
<h3>Notable Targets of SamSam Ransomware Include:</h3>
<ul>
<li><a href="http://www.baltimoresun.com/health/bs-md-medstar-ransom-hack-20160330-story.html">MedStar</a> 27, 2016 ($18,500 ransom)</li>
<li><a href="https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/samsam-ransomware-moves-from-healthcare-to-education">Follet&#8217;s Learning Destiny software</a> 2016 (undisclosed ransom)</li>
<li><a href="http://buffalonews.com/2017/05/20/ecmc-got-hacked-cyber-extortionists/">Erie County Medical Center</a> 9, 2017 ($44,000 ransom)</li>
<li><a href="http://www.daily-times.com/story/news/local/farmington/2018/01/18/farmington-recovering-after-ransomware-attack/1044845001/">City of Farmington, NM</a> 3, 2018 ($35,000 ransom)</li>
<li><a href="http://wane.com/2018/01/18/ransomware-attack-targets-adams-memorial-hospital/">Adams Memorial Hospital</a> 11, 2018 (undisclosed ransom)</li>
<li><a href="https://datarecovery.com/rd/indiana-hospital-pays-55000-get-rid-ransomware/">Hancock Health</a> 11, 2018 ($55,000 ransom)</li>
<li><a href="http://www.govtech.com/security/Davidson-County-NC-Still-Reeling-from-Ransomware-Attack.html">Davidson County, N.C.</a> 16, 2018 (undisclosed ransom)</li>
<li><a href="https://datarecovery.com/rd/samsam-ransomware-infects-cdot/">Colorado Dept. of Transportation</a> 21 and March 1, 2018 (undisclosed ransom)</li>
<li><a href="https://www.myajc.com/news/local-govt--politics/atlanta-officials-warn-cyber-attack-may-compromise-sensitive-data/afZLYCO14WySObFATzKXRP/">City of Atlanta, GA </a>March 22, 2018 ($51,000 ransom)</li>
</ul>
<p>In addition to these high-profile targets, there have been other unspecified victims. A <a href="https://www.fbi.gov/file-repository/ransomware-prevention-and-response-for-cisos.pdf/view">2016 FBI alert</a> referred to multiple &#8220;attacks on healthcare facilities&#8221; without mentioning specific names. More recently, an <a href="https://blog.barkly.com/samsam-ransomware-2018-campaign-hospital-attacks">unnamed Industrial Control Systems</a> (ICS) company was hit by the ransomware.</p>
<h2>How Does SamSam Ransomware Infect My System?</h2>
<p>Unlike the majority of ransomware, SamSam does not spread through spam emails or malicious links. Instead, the distributors target vulnerable servers using brute-forced credentials or by exploiting outdated software. After gaining access, the hackers harvest other credentials and use <a href="https://msdn.microsoft.com/en-us/library/aa383015(v=vs.85).aspx">Remote Desktop Protocol</a> to manually spread SamSam through a network.</p>
<p>The attackers wait a number of days before executing the ransomware payload, making it harder for organizations to discover the initial breach. This can allow the hackers to reinfect a system if the organization attempts to recover without paying the ransom, as happened with the <a href="https://www.denverpost.com/2018/03/01/cdot-samsam-ransomware-attack/">Colorado Department of Transportation</a>. After sufficient time has passed, the hackers run batch scripts which begin running the ransomware. Once SamSam has encrypted files, it drops a ransom note with the payment demand, which varies by incident.</p>
<h2>Can I Disable or Remove SamSam Ransomware Encryption?</h2>
<p>Removing SamSam and decrypting affected files is difficult. As such, it is critical to prevent the ransomware from infecting systems with the following best practices:</p>
<ul>
<li>Update all software promptly (businesses should use a centralized <a href="https://searchsecurity.techtarget.com/feature/Read-this-roundup-before-investing-in-a-patch-management-tool">patch management system</a> to detect vulnerabilities).</li>
<li>Limit the number of attempts to correctly enter passwords for systems.</li>
<li>Regularly back up data while maintaining redundant copies — SamSam can spread to network-based backups before it begins encrypting files, which makes recovery from an attack more difficult when only one backup exists.</li>
<li>Use the <a href="https://www.us-cert.gov/bsi/articles/knowledge/principles/least-privilege">principle of least privilege</a> to mitigate damage done by ransomware.</li>
</ul>
<p>If your systems have been infected by SamSam, Datarecovery.com can help. We&#8217;ll assess your situation and start you down the road to recovery as soon as you call or <a href="https://datarecovery.com/submit.php">start a case</a> with us.</p>
<p>As with all data recovery situations, time is an important factor. If ransomware has infected your computer or network, call 1-800-237-4200 to speak to a malware expert. We&#8217;ll go over your options and help determine the best way to recover from a SamSam attack.</p>
<p>The post <a href="https://datarecovery.com/rd/samsam-ransomware-infection-decryption-services/">SamSam Ransomware Infection And Decryption Services</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>City of Atlanta Hit by SamSam Ransomware</title>
		<link>https://datarecovery.com/rd/city-atlanta-hit-samsam-ransomware/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Mon, 02 Apr 2018 01:08:24 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Data Recovery News]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5751</guid>

					<description><![CDATA[<p>A ransomware attack on the city of Atlanta on Mar. 22 has left officials scrambling to provide services to residents. Many critical services, like public-safety and wastewater treatment, have been unaffected. Meanwhile, other systems have ground to a halt or...</p>
<p>The post <a href="https://datarecovery.com/rd/city-atlanta-hit-samsam-ransomware/">City of Atlanta Hit by SamSam Ransomware</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="size-medium wp-image-5752 alignright" src="https://datarecovery.com/wp-content/uploads/2018/03/DY6FRveW0AIGpt9-300x269.jpg" alt="City of Atlanta Outage Alert, SamSam Ransomware" width="300" height="269" srcset="https://datarecovery.com/wp-content/uploads/2018/03/DY6FRveW0AIGpt9-300x269.jpg 300w, https://datarecovery.com/wp-content/uploads/2018/03/DY6FRveW0AIGpt9-768x688.jpg 768w, https://datarecovery.com/wp-content/uploads/2018/03/DY6FRveW0AIGpt9-1024x917.jpg 1024w, https://datarecovery.com/wp-content/uploads/2018/03/DY6FRveW0AIGpt9.jpg 2048w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p>A ransomware attack on the city of Atlanta on Mar. 22 has left officials scrambling to provide services to residents. Many critical services, like public-safety and wastewater treatment, have been unaffected. Meanwhile, other systems have ground to a halt or slowed considerably.</p>
<p>For instance, the city is temporarily not accepting employment applications. New water service requests and other planning services can be made in person, but processing times are longer than usual. The Hartsfield-Jackson International Airport <a href="https://www.myajc.com/news/local-govt--politics/city-atlanta-officials-provides-little-detail-about-cyberattack/FK2gvnRumL046dgtXmF5TK/">has disabled its wifi</a> and taken security wait times and flight information off its website out of an abundance of caution.</p>
<p>Perhaps the biggest headache for the city is <a href="http://abcnews.go.com/US/atlanta-cyberattack-massive-inconvenience-city-mayor/story?id=53974558">keeping the courts running</a> during the mayhem. The city court cannot validate warrants or process ticket payments (even in person). Court dates continue being pushed back (via tweets) as the city struggles with the ransomware attack.</p>
<blockquote class="twitter-tweet" data-lang="en">
<p dir="ltr" lang="en">RESET NOTICES WILL BE MAILED. <a href="https://t.co/hyV3pcLSE0">pic.twitter.com/hyV3pcLSE0</a></p>
<p>— ATL Municipal Court (@ATLCourt) <a href="https://twitter.com/ATLCourt/status/978984086265106432?ref_src=twsrc%5Etfw">March 28, 2018</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<p><strong>Mayor Keisha Lance Bottoms gave few details on what the city&#8217;s response would be.</strong></p>
<p>When asked if she would consider paying the $51,000 ransom, Bottoms admitted, &#8220;Everything is up for discussion.&#8221; She added that she would <a href="https://www.npr.org/sections/thetwo-way/2018/03/27/597208778/atlanta-working-around-the-clock-to-fight-off-ransomware-attack">consult with federal authorities</a> to determine the best course of action. The city hired a private security company, SecureWorks, to investigate the attack. The FBI, Homeland Security, and the Secret Service are all involved in determining exactly what happened.</p>
<p>&#8220;I just want to make the point that this is much bigger than a ransomware attack,&#8221; Bottoms said at a press conference. &#8220;This is really an attack on our government, which means it&#8217;s an attack on all of us.&#8221;</p>
<p><strong>Fears that the attackers accessed personal data continue. </strong></p>
<p>Officials initially <a href="https://www.myajc.com/news/local-govt--politics/atlanta-officials-warn-cyber-attack-may-compromise-sensitive-data/afZLYCO14WySObFATzKXRP/">warned city employees</a> and any member of the public who had made transactions with the city to check their bank accounts for fraudulent activity.</p>
<p>“Because we don’t know, I think it would be appropriate for the public just to be vigilant in checking their accounts and making sure their credit agencies have also been notified,” Bottoms said shortly after the incident.</p>
<p>On March 26, an official tweet from the city reiterated that sentiment but added that there is still no evidence that sensitive data has been compromised.</p>
<blockquote class="twitter-tweet" data-lang="en">
<p dir="ltr" lang="en">GENERAL REMINDER: At this time, there is no evidence to show that customer or employee data has been compromised. However, customers and employees are encouraged to take precautionary measures to monitor and protect their personal information.</p>
<p>— City of Atlanta, GA (@Cityofatlanta) <a href="https://twitter.com/Cityofatlanta/status/978966933155573761?ref_src=twsrc%5Etfw">March 28, 2018</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<p><strong>The city hasn&#8217;t identified the attacker, but media reports point to a familiar name.</strong></p>
<p>A <em>New York Times</em> article <a href="https://www.nytimes.com/2018/03/27/us/cyberattack-atlanta-ransomware.html?mtrref=www.google.com">has identified</a> the SamSam hacking crew as the responsible party. While few details are known about SamSam, they do have several trademarks.</p>
<p>The group tends to target large organizations who have the resources to pay a hefty ransom. SamSam also has sophisticated methods of covering their tracks that allow them to attack organizations repeatedly.</p>
<p><strong>The same group victimized the Colorado Department of Transportation twice this year.</strong></p>
<p>The <a href="https://datarecovery.com/rd/samsam-ransomware-infects-cdot/">first attack</a> shut down over 2,000 employee computers, forcing workers to use pen and paper to complete work. The city decided not to pay the ransom, but to painstakingly clean the computers of any malware.</p>
<p>When the city&#8217;s IT professionals had cleared 20 percent of computers for employee use, a variant of <a href="https://www.denverpost.com/2018/03/01/cdot-samsam-ransomware-attack/">SamSam reinfected them</a>. Hearing stories like these, it&#8217;s easy to understand why some organizations simply pay the ransom.</p>
<p>To put even more pressure on victims, the SamSam attackers generally target health care facilities and municipal organizations. <a href="https://www.scmagazine.com/samsam-ransomware-continues-to-wreak-havoc-on-infrastructure/article/738983/">Allscripts</a>, <a href="http://wane.com/2018/01/18/ransomware-attack-targets-adams-memorial-hospital/">Adams Memorial Hospital</a>, <a href="http://buffalonews.com/2017/05/20/ecmc-got-hacked-cyber-extortionists/">Erie County Medical Center</a>, and the city of <a href="http://www.daily-times.com/story/news/local/farmington/2018/01/18/farmington-recovering-after-ransomware-attack/1044845001/">Farmington, New Mexico</a> all fell prey to SamSam ransomware in the last year.</p>
<p><strong>Atlanta is now learning a painful but useful lesson in cybersecurity.</strong></p>
<p>The city is documenting its progress and answering frequently asked questions on <a href="https://www.atlantaga.gov/government/ransomware-cyberattack-information">its website</a>, while the mayor promises that more attention will be given to cybersecurity in the future.</p>
<p>&#8220;Just as much as we really focus on our physical infrastructure, we need to focus on the security of our digital infrastructure,&#8221; <a href="https://www.cnn.com/2018/03/27/us/atlanta-ransomware-computers/index.html">Bottoms said</a>. &#8220;I am looking forward to us really being a national model of how cities can shore themselves up and be stronger because of it.&#8221;</p>
<p>&nbsp;</p>
<p>The post <a href="https://datarecovery.com/rd/city-atlanta-hit-samsam-ransomware/">City of Atlanta Hit by SamSam Ransomware</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Only Half of Ransomware Payments Resulted in Decrypted Files</title>
		<link>https://datarecovery.com/rd/half-ransomware-payments-resulted-decrypted-files/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Wed, 21 Mar 2018 20:49:43 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Data Recovery News]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5734</guid>

					<description><![CDATA[<p>A report from a leading research firm found a startling statistic for 2017: only half of ransomware victims who paid a ransom were able to successfully decrypt their files. These findings and others in the report offer even more incentive...</p>
<p>The post <a href="https://datarecovery.com/rd/half-ransomware-payments-resulted-decrypted-files/">Only Half of Ransomware Payments Resulted in Decrypted Files</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A report from a leading research firm found a startling statistic for 2017: only half of ransomware victims who paid a ransom were able to successfully decrypt their files. These findings and others in the report offer even more incentive to confront and adapt to new security challenges in 2018.</p>
<p><strong>The report came from CyberEdge, who surveyed 1,200 IT security professionals and is not affiliated with any security vendor.</strong></p>
<p><img loading="lazy" decoding="async" class="alignright size-medium wp-image-5746" src="https://datarecovery.com/wp-content/uploads/2018/03/cyberthreat-defense-report-2018-by-cyberedge2-300x267.png" alt="Cyberthreat Defense Report 2018 by Cyberedge" width="300" height="267" srcset="https://datarecovery.com/wp-content/uploads/2018/03/cyberthreat-defense-report-2018-by-cyberedge2-300x267.png 300w, https://datarecovery.com/wp-content/uploads/2018/03/cyberthreat-defense-report-2018-by-cyberedge2.png 327w" sizes="auto, (max-width: 300px) 100vw, 300px" />Their <a href="https://cyber-edge.com/wp-content/uploads/2018/03/CyberEdge-2018-CDR.pdf">2018 Cyberthreat Defense Report</a> is an attempt to understand the variety of threats faced by organizations that employ at least 500 people. The results showed that cyberattacks have become increasingly successful over the past five years (though, mercifully, the number of successful attacks is slightly down from last year).</p>
<p>Another illuminating trend is that the percentage of IT professionals who are optimistic about dodging successful attacks in the coming year went from 62 percent in 2014 to 38 percent in 2018. This can be viewed as pessimism or realism, but either way, it&#8217;s an acknowledgement of the great challenges ahead. Respondents listed application containers (like Docker or Rocket), mobile devices, and cloud infrastructure as the weakest links likely to be targeted by a cyberattack.</p>
<p><strong>Malware (viruses, worms, trojans) was voted as the number one general threat to IT security for the second year in a row.</strong></p>
<p>Second place was a tie between ransomware and phishing attacks. Given that many ransomware attacks were paired with worms and other malware (as well as phishing attacks), you can understand how big of a concern ransomware is for security professionals.</p>
<p>And it was not a rare phenomenon either. A surprising 55 percent of surveyed organizations were hit by ransomware in 2017. One area of good news was that many who refused to pay ransoms still recovered their data. Instead of buckling to cybercriminals, they worked to recover data from backups or simply dealt with the data loss. Almost 87 percent of victims who did not pay the ransom recovered their data anyway.</p>
<p>The scarier news was that only 49.6 percent of ransomware victims who paid the ransom were able to decrypt their data. This statistic should convince businesses and individuals of the importance of keeping current backups that are offline or in the cloud.</p>
<p>If a victim cannot recover backups, consulting a professional data recovery company is highly recommended. At Datarecovery.com, the recovery rates for ransomware cases are far higher than those in the CyberEdge survey. Knowing the landscape and having experience help ensure a successful recovery from a ransomware attack. Some strains have freely available decryptors, while others have coding issues that prevent even the attacker from decrypting files. Knowing which avenues to pursue saves time and increases the odds of a successful recovery.</p>
<p><strong>Survey respondents listed &#8220;lack of skilled personnel&#8221; as the greatest barrier to defending against cyberthreats.</strong></p>
<p>In past surveys, &#8220;low security awareness among employees&#8221; has topped that list, but a skilled personnel shortage has slowly climbed the ranks over the past five years. Poor security awareness still placed second as a barrier to IT security (which is concerning, given how long it&#8217;s been an issue).</p>
<p>Overall, the survey showed positive as well as negative trends. Many perennial threats remain: mobile devices and poorly trained employees continue to be security challenges. On the other hand, the number of successful cyberattacks decreased for the first time in five years and security budgets are higher than they&#8217;ve ever been. More than anything, the CyberEdge report reminds us that good IT security requires constant vigilance and adaptation to new threats.</p>
<p>The post <a href="https://datarecovery.com/rd/half-ransomware-payments-resulted-decrypted-files/">Only Half of Ransomware Payments Resulted in Decrypted Files</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SamSam Ransomware Infects CDOT</title>
		<link>https://datarecovery.com/rd/samsam-ransomware-infects-cdot/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Mon, 19 Mar 2018 16:17:14 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Data Recovery News]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5719</guid>

					<description><![CDATA[<p>SamSam ransomware has infected thousands of computers at the Colorado Department of Transportation. <a href="https://www.denverpost.com/2018/02/21/samsam-virus-ransomware-cdot/">Over 2,000 employee computers</a> were shut down to stop the spread of the malware after it was discovered on Feb. 21, and systems are still not back...</p>
<p>The post <a href="https://datarecovery.com/rd/samsam-ransomware-infects-cdot/">SamSam Ransomware Infects CDOT</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-full wp-image-5728 aligncenter" src="https://datarecovery.com/wp-content/uploads/2018/03/CDOT-logo-5.png" alt="CDOT logo" width="693" height="190" srcset="https://datarecovery.com/wp-content/uploads/2018/03/CDOT-logo-5.png 693w, https://datarecovery.com/wp-content/uploads/2018/03/CDOT-logo-5-300x82.png 300w" sizes="auto, (max-width: 693px) 100vw, 693px" /></p>
<p>SamSam ransomware has infected thousands of computers at the Colorado Department of Transportation. <a href="https://www.denverpost.com/2018/02/21/samsam-virus-ransomware-cdot/">Over 2,000 employee computers</a> were shut down to stop the spread of the malware after it was discovered on Feb. 21, and systems are still not back online.</p>
<p>Office of Information Technology chief technology officer David McCurdy released a statement shortly after the attack that said, “This ransomware virus was a variant and the state worked with its antivirus software provider to implement a fix today. The state has robust backup and security tools and has no intention of paying ransomware. Teams will continue to monitor the situation closely and will be working into the night.”</p>
<p><strong>SamSam is a strain of ransomware that targeted hospitals and others throughout January.</strong></p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-5726 alignright" src="https://datarecovery.com/wp-content/uploads/2018/03/samsam-ransomware-graphic05.png" alt="SamSam ransomware skull-and-crossbones" width="360" height="240" srcset="https://datarecovery.com/wp-content/uploads/2018/03/samsam-ransomware-graphic05.png 360w, https://datarecovery.com/wp-content/uploads/2018/03/samsam-ransomware-graphic05-300x200.png 300w" sizes="auto, (max-width: 360px) 100vw, 360px" /></p>
<p>An Indiana hospital, Hancock Health, <a href="https://datarecovery.com/rd/indiana-hospital-pays-55000-get-rid-ransomware/">paid a $55,000 ransom</a> to restore files and functionality after SamSam infected its servers. Even though the hospital claimed to have complete backups of encrypted files, administrators chose to pay the ransom to avoid costly delays in restoring their systems.</p>
<p><a href="https://www.bleepingcomputer.com/news/security/samsam-ransomware-hits-colorado-dot-agency-shuts-down-2-000-computers/">Security researchers</a> say that the group behind SamSam uses a brute-force attack on Remote Desktop Protocol (RDP) connections to gain access to internal networks. Then, hackers manually install the ransomware, which begins encrypting files. To protect against SamSam, <a href="https://www.bleepingcomputer.com/news/security/samsam-ransomware-hits-hospitals-city-councils-ics-firms/">researchers warn</a> that any computers open to remote RDP connections should have strong and unique passwords.</p>
<p>SamSam was also the culprit behind attacks on <a href="https://www.scmagazine.com/samsam-ransomware-continues-to-wreak-havoc-on-infrastructure/article/738983/">Allscripts</a>, <a href="http://wane.com/2018/01/18/ransomware-attack-targets-adams-memorial-hospital/">Adams Memorial Hospital</a>, <a href="http://buffalonews.com/2017/05/20/ecmc-got-hacked-cyber-extortionists/">Erie County Medical Center</a>, and the city of <a href="http://www.daily-times.com/story/news/local/farmington/2018/01/18/farmington-recovering-after-ransomware-attack/1044845001/">Farmington, New Mexico</a>. <a href="https://blog.barkly.com/samsam-ransomware-2018-campaign-hospital-attacks">Security experts</a> believe that these attacks were carried out by a single group of hackers.</p>
<p><strong>CDOT continues with daily work the old-fashioned way.</strong></p>
<p>“Our critical systems, our road operations, traffic operation systems are still online. We still have people on the road plowing and doing construction,” CDOT spokesperson Amy Ford <a href="https://www.denverpost.com/2018/02/26/samsam-ransomware-virus-cdot/">told the </a><a href="https://www.denverpost.com/2018/02/26/samsam-ransomware-virus-cdot/"><em>Denver Post</em></a>. “The things we have changed a little bit is we’ve had some business bids in the process of being done and we’ve extended times and dates. And we’re working with our contractors.”</p>
<p>The incident demonstrates the difficulties of recovering from a ransomware attack. Even though CDOT backed up their data, they are beginning their second week offline. Mecklenburg County, North Carolina <a href="http://www.charlotteobserver.com/news/local/article188302469.html">faced a similar slog</a> after a ransomware called LockCrypt infected county government servers. Officials spent well over a month <a href="https://www.mecknc.gov/news/Pages/Countywide-system-outage.aspx">scrambling to restore services</a> after that incident.</p>
<p>Ford summarized the frustrating but manageable limbo that CDOT is currently in.</p>
<p>“No one is back online. What we’re doing is working offline. All our critical services are still online — cameras, variable message boards, CoTrip, alerts on traffic. They are running on separate systems,” Ford said. “The message I’m sharing is CDOT operated for a long time without computers, so we’ll use pen and paper.”</p>
<p>The post <a href="https://datarecovery.com/rd/samsam-ransomware-infects-cdot/">SamSam Ransomware Infects CDOT</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>2017 Ransomware Recap</title>
		<link>https://datarecovery.com/rd/2017-ransomware-recap/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Thu, 04 Jan 2018 16:23:38 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Data Recovery News]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5635</guid>

					<description><![CDATA[<p>Ransomware became a household name in 2016. As hackers extorted ransoms from hospitals, universities, and other groups in return for files, the public became aware of how vulnerable devices are in this connected age.<br />
Even with the awareness of this...</p>
<p>The post <a href="https://datarecovery.com/rd/2017-ransomware-recap/">2017 Ransomware Recap</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Ransomware became a household name in 2016. As hackers extorted ransoms from hospitals, universities, and other groups in return for files, the public became aware of how vulnerable devices are in this connected age.</p>
<p>Even with the awareness of this threat, companies and individuals couldn&#8217;t stop the onslaught of ransomware attacks in 2017. This year has seen a steady drizzle of new ransomware variants punctuated by three large-scale attacks that used hacking tools from our own National Security Agency.</p>
<p>Because of ransomware attacks, two companies estimated their losses in the hundreds of millions of dollars and Britain&#8217;s National Health Service diverted ambulances and cancelled operations until they regained control of their computers. In addition to the major attacks, the underground market for smaller-scale operations continued to boom, and open-source ransomware gave hackers a head start. Here&#8217;s how the big events of 2017 went down.</p>
<h3><img loading="lazy" decoding="async" class="alignright size-medium wp-image-4715" src="https://datarecovery.com/wp-content/uploads/2017/01/st-louis-public-library-exterior-500-300x199.jpg" alt="st louis public library, exterior at night" width="300" height="199" srcset="https://datarecovery.com/wp-content/uploads/2017/01/st-louis-public-library-exterior-500-300x199.jpg 300w, https://datarecovery.com/wp-content/uploads/2017/01/st-louis-public-library-exterior-500.jpg 500w" sizes="auto, (max-width: 300px) 100vw, 300px" />St. Louis Public Library</h3>
<p>When staff arrived to work on Thursday, Jan. 19, they were greeted with locked computer screens throughout all branches of the St. Louis Public Library. <a href="https://datarecovery.com/rd/st-louis-public-library-grinds-halt-due-ransomware-attack/">Hackers had exploited a vulnerability</a> in a library voicemail server and locked 700 staff and public computers. The attackers demanded $34,000 in bitcoin to restore the computers.</p>
<p>The library refused to pay and began furiously working to restore services. Finally, on Jan. 30, they were able to <a href="https://www.slpl.org/news/an-update-on-the-ransomware-attack-against-slpl/">announce that all computers</a> used by the public were fully restored. Enhancements to the library system&#8217;s cybersecurity remains an ongoing project.</p>
<h3>Microsoft Releases Eternal Blue Patch</h3>
<p>On March 14, Microsoft issued a <a href="https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2017/ms17-010">critical security bulletin</a> for a vulnerability in all unsupported versions of Windows. The reason? The NSA had discovered a security flaw in Windows operating systems and added it to the agency&#8217;s stockpile of cyber weapons. A group called the <a href="https://www.theatlantic.com/technology/archive/2017/05/shadow-brokers/527778/">Shadow Brokers</a> accessed and leaked this stockpile, giving hackers powerful tools for wreaking havoc.</p>
<p>By installing Microsoft&#8217;s patch, users protected themselves from the vulnerability that the NSA discovered (which was known as Eternal Blue). Unfortunately, those who did not patch their operating systems would fall victim to cyber attacks in the coming months when the NSA exploit was paired with ransomware and unleashed.</p>
<h3>WannaCry</h3>
<p>The first attack that paired ransomware with Eternal Blue was WannaCry. The attack initially occurred in Asia on May 12 and quickly spread to more than 230,000 devices. Infected computers spread the ransomware to other machines on the same network as well as random computers over the internet.</p>
<p>A <a href="https://www.malwaretech.com/2017/05/how-to-accidentally-stop-a-global-cyber-attacks.html">security researcher</a> discovered a kill switch which stopped the spread, but more than 300,000 computers had already been infected. Companies and organizations affected by the attack include Britain&#8217;s <a href="http://www.bbc.com/news/technology-41753022">National Health Service</a>, <a href="https://www.mercurynews.com/2017/05/12/fedex-hit-as-nsa-linked-ransomware-spreads-around-the-world/">FedEx</a>, <a href="https://www.reuters.com/article/us-honda-cyberattack-idUSKBN19C0EI">Honda</a>, <a href="http://money.cnn.com/2017/05/15/technology/ransomware-whos-been-hit/index.html">Hitachi</a>, <a href="http://www.businessinsider.com/telefonica-and-other-firms-have-been-infected-by-wannacry-malware-2017-5">Telefónica</a>, and dozens more.</p>
<p><img loading="lazy" decoding="async" class="alignright size-medium wp-image-5631" src="https://datarecovery.com/wp-content/uploads/2017/12/north-korea-wannacry02-300x200.jpg" alt="north korea flag wannacry ransomware virus" width="300" height="200" srcset="https://datarecovery.com/wp-content/uploads/2017/12/north-korea-wannacry02-300x200.jpg 300w, https://datarecovery.com/wp-content/uploads/2017/12/north-korea-wannacry02-768x512.jpg 768w, https://datarecovery.com/wp-content/uploads/2017/12/north-korea-wannacry02.jpg 960w" sizes="auto, (max-width: 300px) 100vw, 300px" />While an unprecedented number of machines were infected, the attackers received relatively little money from ransom payments. Just <a href="http://money.cnn.com/2017/08/03/technology/wannacry-bitcoin-ransom-moved/index.html">$140,000 in bitcoin</a> was withdrawn from the three accounts associated with the attack.</p>
<p>In the months following the attack, many pointed fingers at North Korea&#8217;s cyber unit as the originator of the attacks. Finally, in a Dec. 18 <a href="https://www.wsj.com/articles/its-official-north-korea-is-behind-wannacry-1513642537">op-ed piece</a>, a Trump adviser officially declared North Korea responsible for the attack.</p>
<h3>Petya, NotPetya, Nyetna</h3>
<p>Whatever you call it, this attack wreaked havoc and proved that not everyone learned a lesson from the WannaCry attack. NotPetya targeted the same Windows security flaw that Microsoft provided a patch for (and that WannaCry exploited).</p>
<p>Ground zero for this attack was Ukraine, where a popular piece of tax-filing software, MEDoc, <a href="http://www.bbc.com/news/technology-40428967">spread NotPetya</a> to businesses and government organizations. Soon, NotPetya moved beyond Ukraine&#8217;s borders and devastated international businesses, such as <a href="http://www.computerweekly.com/news/450426854/NotPetya-attack-cost-up-to-15m-says-UK-ad-agency-WPP">advertising company WPP</a>, <a href="https://www.ft.com/content/1b5f863a-624c-11e7-91a7-502f7ee26895">law firm DLA Piper</a>, <a href="https://www.theregister.co.uk/2017/08/16/notpetya_ransomware_attack_cost_us_300m_says_shipping_giant_maersk/">shipping giant Maersk</a>, and <a href="https://www.theregister.co.uk/2017/09/20/fedex_notpetya_damages/">FedEx</a>. Both Maersk and FedEx estimated their losses from the attack to be around $300 million.</p>
<p>Initially, analysts blamed a ransomware called Petya for the cyber attack. However, <a href="https://securelist.com/expetrpetyanotpetya-is-a-wiper-not-ransomware/78902/">security experts</a> make a <a href="http://tass.com/world/972758">convincing case</a> that NotPetya is a wiper (meaning the intent was to destroy files, not hold them hostage) and that the <a href="https://blog.comae.io/petya-2017-is-a-wiper-not-a-ransomware-9ea1d8961d3b">attackers could not decrypt a victim&#8217;s files</a> even if they wanted to.</p>
<p>So, why would an attacker disguise a wiper as ransomware? Ukraine&#8217;s security service (SBU) <a href="https://www.theregister.co.uk/2017/07/04/sbu_claims_russia_was_behind_notpetya/">blames Russia</a>. Since the downfall of the Soviet Union in 1991, the two countries have had periods of tension. In 2014, Ukrainian voters ousted their pro-Russia president <a href="http://www.bbc.com/news/world-europe-25182830">Viktor Yanukovych</a>. Shortly after, Russia annexed Crimea, a Ukrainian peninsula, and the international community responded with heavy sanctions against Russia.</p>
<p>This may be more geopolitical history than you wanted to know, but the moral of the story is: cyber wars between nation-states can spill out into the general public. If NotPetya was in fact intended to cripple Ukraine&#8217;s infrastructure, then all those thousands of infected computers throughout the rest of the world were simply collateral damage. Welcome to the 21st century.</p>
<h3>Bad Rabbit</h3>
<p>Bad Rabbit was the ransomware used in the third major international attack of 2017. Compared to the massive disruptions and economic costs of WannaCry and NotPetya, Bad Rabbit was a mere nuisance. But for those affected, including Kiev&#8217;s metro system, Odessa&#8217;s airport, and Russian media group Interfax, the ransomware caused major disruptions. After its website went down, <a href="https://www.theguardian.com/technology/2017/oct/25/bad-rabbit-game-of-thrones-ransomware-europe-notpetya-bitcoin-decryption-key">Interfax took to publishing news stories</a> on Facebook until the site was restored.</p>
<p>Researchers believe the same attackers may be responsible for NotPetya and Bad Rabbit. There are similarities in the codes of NotPetya and Bad Rabbit, and <a href="https://www.theguardian.com/technology/2017/oct/25/bad-rabbit-game-of-thrones-ransomware-europe-notpetya-bitcoin-decryption-key">the same web servers were used</a> to distribute the initial software in both cases.</p>
<p>Bad Rabbit did not use the Eternal Blue exploit, though it used a different leaked NSA tool called Eternal Romance. Ukrainian state cyber police <a href="https://blog.knowbe4.com/bad-rabbit-ransomware-attack-was-hiding-a-spear-phishing-campaign">claimed that the ransomware attack</a> was used as cover to steal financial information from targeted Ukrainian companies.</p>
<h3>Ransomware-as-a-Service</h3>
<p>If 2016 put ransomware on the map, 2017 established it in the marketplace. Ransomware-as-a-service (RaaS) has existed since at least 2015, but there are now more opportunities than ever for someone with little technical skill to buy ransomware from the dark web. Here&#8217;s how it works.</p>
<p>A customer either pays a subscription to or agrees to share a percentage of ransom money with the ransomware developer. The customer can then launch an attack on the targets of his choosing. <a href="https://nakedsecurity.sophos.com/2017/12/13/5-ransomware-as-a-service-raas-kits-sophoslabs-investigates/">Slicker RaaS variants</a> have user-friendly dashboards to allow even the most technologically novice to launch cyber attacks.</p>
<p>A <a href="https://www.carbonblack.com/wp-content/uploads/2017/10/Carbon-Black-Ransomware-Economy-Report-101117.pdf">report from Carbon Black</a> found a 2,502 percent increase in ransomware for sale on the dark web from 2016 to 2017. The same report discovered 45,000 listings for RaaS products. With that kind of competition, expect the products to become even more sophisticated and user-friendly in the 2018.</p>
<h3>Open Source Ransomware</h3>
<p><img loading="lazy" decoding="async" class="size-medium wp-image-5328 alignnone" src="https://datarecovery.com/wp-content/uploads/2017/06/hidden-tear-ransomware-ascii-art2-300x158.png" alt="Hidden Tear Ransomware GitHub info" width="300" height="158" srcset="https://datarecovery.com/wp-content/uploads/2017/06/hidden-tear-ransomware-ascii-art2-300x158.png 300w, https://datarecovery.com/wp-content/uploads/2017/06/hidden-tear-ransomware-ascii-art2.png 530w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>Another cause for the proliferation of ransomware is the posting of open source code. <a href="https://datarecovery.com/rd/hidden-tear-ransomware-still-wreaking-havoc/">Hidden Tear</a> was the first such ransomware to be posted freely on the internet. The developer, Utju Sen, claimed that he shared it for educational purposes.</p>
<p>Sen built several backdoors into the code so that anyone affected by it could decrypt their files. Unfortunately, hackers have taken his code and closed those backdoors in order to make more functional ransomware. Hackers have since created at least a <a href="http://news.softpedia.com/news/new-open-source-linux-ransomware-shows-infosec-community-divide-508669.shtml">dozen ransomware families</a> (8lock8, Blocatto, Cryptear, Fakben, GhostCrypt, Globe, Hi Buddy!, Job Crypter, KryptoLocker, MireWare, PokemonGO, and Sanction) based on Hidden Tear.</p>
<p>And Sen&#8217;s Hidden Tear isn&#8217;t the only example. Others have created open-source ransomware ostensibly to improve ransomware detection and prevention. However, most security professionals have more sophisticated means of understanding and detecting malware. That makes these source codes a head start for criminals and not much more.</p>
<h2>Ransomware in the New Year</h2>
<p>Several large security companies have released reports with their predictions for the new year, and the message is clear. If you or your business use the internet, ransomware will continue to be a threat.</p>
<p><a href="https://www.sophos.com/en-us/medialibrary/PDFs/technical-papers/malware-forecast-2018.pdf?la=en">One firm predicts</a> that the combination of ransomware as a service (like <a href="https://datarecovery.com/rd/cerber-ransomware-infection-decryption-services/">Cerber</a>) and the resurgence of worms will lead to a surge in attacks and infections. Because hackers now have access to a trove of NSA tools, expect to see attacks similar to WannaCry again in 2018.</p>
<p>We can also expect to see <a href="https://researchcenter.paloaltonetworks.com/2017/12/2018-predictions-recommendations-ransomware-plague-just-beginning/">more attacks on Mac computers</a>. <a href="https://datarecovery.com/rd/keranger-ransomware-infection-decryption-services/">Keranger</a> was the first ransomware to target a Mac OS, and it did so with limited success. However, Mac users remain a lucrative target for hackers, who likely haven&#8217;t given up in their attempts to infect this relatively untapped group.</p>
<h2>What You Can Do</h2>
<p>Security experts recommend a multi-pronged approach to protecting yourself from ransomware. Most importantly, keeping multiple copies of current backups will ensure that you never have to pay a ransom.</p>
<p>Avoid suspicious attachments and links (and teach everyone who uses your network to do the same) to reduce the chances of downloading malware. Keep all software up to date and rely on reputable antivirus software to give you further protection.</p>
<p>The massive global attacks of 2017 showed that everyone from individual computer users to multi-national corporations are vulnerable. Following the above practices (and ensuring that anyone who uses your computer does too) will protect you from the costly headache of ransomware.</p>
<p>The post <a href="https://datarecovery.com/rd/2017-ransomware-recap/">2017 Ransomware Recap</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The 4 Most Game-Changing Ransomware Attacks</title>
		<link>https://datarecovery.com/rd/4-game-changing-ransomware-attacks/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Mon, 09 Oct 2017 22:06:07 +0000</pubDate>
				<category><![CDATA[Data Recovery News]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5444</guid>

					<description><![CDATA[<p>Every week, new strains of ransomware infect computers or are spotted by security researchers while still in development. Most of them are small-scale operations that attract little attention.<br />
Every once in a while, a new malware will make headlines based...</p>
<p>The post <a href="https://datarecovery.com/rd/4-game-changing-ransomware-attacks/">The 4 Most Game-Changing Ransomware Attacks</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Every week, new strains of ransomware infect computers or are spotted by security researchers while still in development. Most of them are small-scale operations that attract little attention.</p>
<p>Every once in a while, a new malware will make headlines based on some novel feature. The distributors of <a href="https://datarecovery.com/rd/popcorn-time-ransomware-new-era-malware/">Popcorn Time</a>, an in-dev ransomware, would decrypt a victim&#8217;s files if they infected two other victims who ended up paying.</p>
<p><a href="https://datarecovery.com/rd/jigsaw-ransomware-infection-decryption-services/">Jigsaw</a> used images from <em>Saw</em> to increase the intimidation factor and brand their otherwise nondescript malware. <a href="https://www.bleepingcomputer.com/news/security/the-philadelphia-ransomware-offers-a-mercy-button-for-compassionate-criminals/">Philadelphia</a> ransomware can be bought as a service and tweaked to fit an attacker&#8217;s specific needs. However, none of these have proven to be large players in the long run.</p>
<p>There are a handful of malicious programs that have changed the landscape of the ransomware world. Here are the four most revolutionary, game-changing ransomware strains and how they influenced their successors.</p>
<h2>The AIDS Trojan Horse: The Advent of Ransomware</h2>
<p>In 1989, an evolutionary biologist named <a href="https://www.theatlantic.com/technology/archive/2016/05/the-computer-virus-that-haunted-early-aids-researchers/481965/">Joseph Popp distributed 20,000 floppy disks</a> to AIDS researchers around the world. The disks contained a questionnaire that Popp claimed would help doctors determine a patient&#8217;s risk of developing the AIDS virus. In reality, Popp had hidden an early form of ransomware on the disks and was using a social engineering technique to spread it.</p>
<p>To avoid being pinpointed as the author of the malware, Popp wrote the code so that the ransomware lay dormant until an infected computer booted up 90 times. On that 90th boot, the virus encrypted the computer&#8217;s files and displayed a ransom note.</p>
<p>The <a href="https://www.knowbe4.com/aids-trojan">note instructed victims</a> to send $189 to a PO box in Panama, a country with infamously lax business laws. Few victims made payments and British authorities quickly arrested Popp and charged him with blackmail. He avoided jail time when a judge declared Popp mentally unfit to stand trial. In the meantime, a researcher named Jim Bates created a tool to restore victims&#8217; files by removing the virus and decrypting the files.</p>
<p><strong>What it changed: </strong>Popp&#8217;s malware had four characteristics that future ransomware developers and distributors would copy: a scaremongering note, a hard-to-track payment scheme, encryption of important files (albeit rudimentary and breakable), and the use of social engineering to trick victims into installing the malware themselves.</p>
<h2>CryptoLocker: Ransomware Modernizes and Scales</h2>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-4542" src="https://datarecovery.com/wp-content/uploads/2016/05/CryptoLocker-ransomware-encrypted-files-message.png" alt="CryptoLocker ransomware encrypted files message" width="432" height="336" srcset="https://datarecovery.com/wp-content/uploads/2016/05/CryptoLocker-ransomware-encrypted-files-message.png 432w, https://datarecovery.com/wp-content/uploads/2016/05/CryptoLocker-ransomware-encrypted-files-message-300x233.png 300w" sizes="auto, (max-width: 432px) 100vw, 432px" /></p>
<p>In September 2013 (almost 25 years after the first ransomware incident), the modern era of ransomware began. <a href="https://www.avast.com/c-cryptolocker">CryptoLocker spread through the Gameover ZeuS botnet</a> via infected email attachments.</p>
<p>The exact number of victims is unknown, but estimates suggest there were <a href="http://www.bbc.com/news/technology-28661463">500,000 people who lost data</a> because of CryptoLocker. This sophisticated crypto-ransomware may have been too successful for its own good, as the staggering number of victims prompted international cooperation to catch the attackers. The U.S. Department of Justice, the FBI, Europol, and others collaborated for <a href="https://en.wikipedia.org/wiki/Operation_Tovar">Operation Tovar</a>, which took down the Gameover ZeuS botnet and gained access to the decryption keys.</p>
<p>While all victims eventually had the opportunity to decrypt their data, it took nearly a year for law enforcement and security firms to create a tool for this purpose. The CryptoLocker attack was an early indication that ransomware had the potential to massively disrupt business and prevent access to data from thousands of miles away.</p>
<p><strong>What it changed: </strong>CryptoLocker showed the devastation that a large botnet could cause when it sends out millions of phishing emails infected with ransomware. The sophisticated encryption method also proved that ransomware could permanently prevent access to files when the decryption key was withheld.</p>
<h2>Hidden Tear: Open-Source Code Makes Ransomware Easy</h2>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-5326" src="https://datarecovery.com/wp-content/uploads/2017/06/hidden-tear-ransomware-ascii-art.png" alt="Hidden Tear Ransomware ASCII art" width="453" height="138" srcset="https://datarecovery.com/wp-content/uploads/2017/06/hidden-tear-ransomware-ascii-art.png 453w, https://datarecovery.com/wp-content/uploads/2017/06/hidden-tear-ransomware-ascii-art-300x91.png 300w" sizes="auto, (max-width: 453px) 100vw, 453px" /></p>
<p>Utju Sen was a Turkish programmer who <a href="https://www.tripwire.com/state-of-security/security-data-protection/cyber-security/hidden-tear-project-forbidden-fruit-is-the-sweetest/">created a ransomware called Hidden Tear</a>. Sen didn&#8217;t want to use the malware for financial gain, but he did want to share his creation. So, he made it freely available to download for educational purposes. Sen built several backdoors into the code so that any files encrypted by it could be decrypted.</p>
<p>Hackers quickly realized they could use Sen&#8217;s code for ransomware campaigns of their own. They also realized that they could tweak the code to close the backdoors. To make matters worse, some of the variants had changes to the code that made it difficult to decrypt—even if the attackers supplied the decryption key.</p>
<p>Variants of Hidden Tear continue showing up in new guises. In June 2017, a <a href="https://twitter.com/ChristiaanBeek/status/899557658071633920">McAfee engineer found</a> that nearly 30 percent of new ransomware strains were based on Hidden Tear.</p>
<p><strong>What it changed:</strong> Hidden Tear provided open-source code for programmers who have minimal skills to attack computers. Even inexperienced hackers who botch the code can wreak havoc and earn money (even if they can&#8217;t successfully decrypt encrypted files).</p>
<h2>WannaCry: With Help From the NSA, Ransomware Spreads Fast</h2>
<p>This sophisticated attack combined ransomware with a worm that targeted a vulnerability in older Microsoft Windows operating systems. The public was shocked to learn that the U.S. <a href="https://www.independent.co.uk/news/uk/home-news/nhs-cyber-attack-edward-snowden-accuses-nsa-not-preventing-ransomware-a7733941.html">National Security Agency had discovered</a> the vulnerability and created a hacking weapon out of it (known as an exploit) rather than report it to Microsoft.</p>
<p>The worm aspect of WannaCry allowed it to spread laterally to other computers on the same network. One of the hardest hit organizations was Britain&#8217;s National Health Service, <a href="https://www.theguardian.com/technology/2017/may/13/nhs-workers-and-patients-on-how-cyber-attack-has-affected-them">whose services were severely disrupted</a>. Germany&#8217;s national railway service, a Spanish telecom giant, and French carmaker Renault <a href="https://www.washingtonpost.com/business/economy/more-than-150-countries-affected-by-massive-cyberattack-europol-says/2017/05/14/5091465e-3899-11e7-9e48-c4f199710b69_story.html?utm_term=.784a9a090698">were all affected by the attack</a> as well.</p>
<p>The cryptoworm spread to over 150 countries over the course of 48 hours. The spread slowed when a <a href="https://www.ncsc.gov.uk/blog-post/finding-kill-switch-stop-spread-ransomware-0">security researcher Marcus Hutchins found a kill switch</a> in the malware&#8217;s code. <a href="https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/">Microsoft also took the unusual step</a> of providing a patch for their older, unsupported operating systems to prevent any further attacks using the NSA exploit.</p>
<p><strong>What it changed:</strong> The attack proved how quickly a combined ransomware/worm can spread—especially on networks using unsupported operating systems. Sadly, the Petya/Nyetna attack that occurred months later successfully <a href="https://krebsonsecurity.com/2017/06/petya-ransomware-outbreak-goes-global/">targeted the same vulnerability</a> on thousands of computers that still were not patched.</p>
<h2>What Comes Next?</h2>
<p>Many of the tactics used by the above strains of ransomware continue to be used today. Mass phishing campaigns conducted by botnets allow attackers to cast a wide net for potential victims. As email providers get better at detecting malware in attachments, hackers change their tactics to better hide it.</p>
<p>To protect your home or business from ransomware attacks, you don&#8217;t need to predict the exact method that hackers will use. Rather, protect yourself from any data loss situation by regularly backing up all essential data. Having reliable backups on media disconnected from your computer can save your data from ransomware attacks and the more mundane situations that might occur.</p>
<p>The post <a href="https://datarecovery.com/rd/4-game-changing-ransomware-attacks/">The 4 Most Game-Changing Ransomware Attacks</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Locky Creators Tweak Variants To Evade Detection</title>
		<link>https://datarecovery.com/rd/locky-creators-tweak-variants-evade-detection/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Wed, 04 Oct 2017 16:53:03 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Data Recovery News]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5438</guid>

					<description><![CDATA[<p>Locky ransomware first appeared in February 2016 using a simple but ingenious social engineering method. <a href="https://arstechnica.com/information-technology/2016/02/locky-crypto-ransomware-rides-in-on-malicious-word-document-macro/">The distributors sent thousands of emails</a> around the world with an infected Microsoft Word document that appeared as gibberish when opened.<br />
The message, &#8220;Enable macro...</p>
<p>The post <a href="https://datarecovery.com/rd/locky-creators-tweak-variants-evade-detection/">Locky Creators Tweak Variants To Evade Detection</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Locky ransomware first appeared in February 2016 using a simple but ingenious social engineering method. <a href="https://arstechnica.com/information-technology/2016/02/locky-crypto-ransomware-rides-in-on-malicious-word-document-macro/">The distributors sent thousands of emails</a> around the world with an infected Microsoft Word document that appeared as gibberish when opened.</p>
<p>The message, &#8220;Enable macro if the data encoding is incorrect,&#8221; would prod users into changing their settings. Those who turned on macros in Word initiated the ransomware&#8217;s installation process and became the first victims of Locky.</p>
<p>Since that first wave of infections, Locky has vanished and then reappeared repeatedly. The one constant is that it always returns with a new extension and a few tweaks to better evade antivirus software.</p>
<div id="attachment_4517" style="width: 604px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-4517" class="wp-image-4517 size-full" src="https://datarecovery.com/wp-content/uploads/2016/04/Locky-ransomware-message-screenshot2.png" alt="Locky ransomware message screenshot" width="594" height="407" srcset="https://datarecovery.com/wp-content/uploads/2016/04/Locky-ransomware-message-screenshot2.png 594w, https://datarecovery.com/wp-content/uploads/2016/04/Locky-ransomware-message-screenshot2-300x206.png 300w" sizes="auto, (max-width: 594px) 100vw, 594px" /><p id="caption-attachment-4517" class="wp-caption-text">A previous Locky version ransom message</p></div>
<h2>Ykcol Variant Uses 7z or 7zip Extension</h2>
<p>The latest incarnation of Locky is the ykcol variant (for those wondering about the unusual name, ykcol is locky backwards). More significant than the updated extension is an updated tactic. This variant is <a href="https://www.bleepingcomputer.com/news/security/locky-ransomware-switches-to-the-ykcol-extension-for-encrypted-files/">distributed in a 7z file</a>.</p>
<p>This file extension is probably unfamiliar to less techy computer users—it&#8217;s a format for highly compressed and encrypted files. Most computer users don&#8217;t even have the necessary software for unzipping such a file. Experts believe that the distributors hid the Locky variant in the obscure format to evade the filters of Gmail and other mail providers.</p>
<h2>Ykcol Is the Latest in a String of Variants</h2>
<p>From <a href="https://blog.malwarebytes.com/cybercrime/2017/08/locky-ransomware-returns-to-the-game-with-two-new-flavors/">February 2016 to September 2017</a>, Locky has morphed its .locky extension to .zepto, .odin, .shit, .thor, .aesir, .zzzzz, .osiris, .loptr, .diablo6, .lukitus, and finally, to .ykcol. None of these variants can be decrypted without the key, which only the distributors of the ransomware hold.</p>
<p>Locky has been a persistent threat over the last 18 months accounting for <a href="https://www.malwarebytes.com/pdf/white-papers/us-ransomware.pdf">14 percent of all ransomware detections globally</a> in fall of 2016. It has since overtaken <a href="https://datarecovery.com/rd/cerber-ransomware-infection-decryption-services/">Cerber</a> as the largest ransomware family. At times, the prolific ransomware appears to become inactive, but time and time again, it has reappeared with new features and distribution tactics.</p>
<h2>Who Created Locky?</h2>
<p>There are numerous clues, but no firm answers as to who created Locky. The ransomware has a flag that detects if a computer&#8217;s operating system uses the Russian language. <a href="https://securingtomorrow.mcafee.com/business/locky-ransomware-makes-comeback-new-diablo6-lukitus-variants/">If the OS is in Russian</a>, Locky and its variants will not infect the computer. On top of that evidence, the majority of the ransomware&#8217;s attacks have been traced to Russia.</p>
<p>Though experts believe that a Russian group is responsible for creating and distributing Locky, it&#8217;s unclear exactly who they are. Locky is one of the most sophisticated ransomware families, so its creators are certainly highly skilled.</p>
<h2>Attacks Continue at Huge Volumes</h2>
<p>In early September 2017, <a href="https://gbhackers.com/massive-locky-ransomware-campaign/">security experts at Appriver</a> detected 23 million spam messages containing Locky in a single 24-hour period. Clearly, the distributors are playing a numbers game. If only a miniscule fraction of those targeted download the ransomware, there will still be plenty of victims and potential ransom payments.</p>
<p>The subject lines of the spam emails contained words like &#8220;please print,&#8221; &#8220;documents,&#8221; or &#8220;photos.&#8221; The attackers attempt to lure in victims with curiosity over what may be attached to the email. Because of the overwhelming number of spam emails sent, it is more important than ever to scrutinize and verify attachments before downloading them.</p>
<p>Other security measures to avoid Locky and other ransomware include:</p>
<ul>
<li>Back up essential files frequently.</li>
<li>Patch all software when updates become available.</li>
<li>Use security software that detects ransomware behavior.</li>
<li>Enable extension viewing so you can see executable files hidden as other documents.</li>
</ul>
<p>Locky continues to evolve and other families of ransomware pose new threats every day. Use good internet hygiene and follow the above tips to avoid the costly effects of a ransomware infection.</p>
<p>The post <a href="https://datarecovery.com/rd/locky-creators-tweak-variants-evade-detection/">Locky Creators Tweak Variants To Evade Detection</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hidden Tear Ransomware Still Wreaking Havoc</title>
		<link>https://datarecovery.com/rd/hidden-tear-ransomware-still-wreaking-havoc/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Wed, 30 Aug 2017 21:00:42 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Data Recovery News]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5404</guid>

					<description><![CDATA[<p>A Turkish computer programmer had a simple idea—create functional ransomware with backdoors and offer it for free to educate programmers. If any hackers used the malware to encrypt someone&#8217;s files, victims could use the backdoors to restore their data.<br />
The...</p>
<p>The post <a href="https://datarecovery.com/rd/hidden-tear-ransomware-still-wreaking-havoc/">Hidden Tear Ransomware Still Wreaking Havoc</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A Turkish computer programmer had a simple idea—create functional ransomware with backdoors and offer it for free to educate programmers. If any hackers used the malware to encrypt someone&#8217;s files, victims could use the backdoors to restore their data.</p>
<p>The reality ended up being far more complicated. And two years later, variants of Hidden Tear ransomware continue to victimize internet users around the world.</p>
<h2>The programmer, Utju Sen, created viable ransomware that he dubbed Hidden Tear.</h2>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-5405" src="https://datarecovery.com/wp-content/uploads/2017/08/hidden-tear-info.png" alt="Hidden Tear Info from GitHub" width="619" height="575" srcset="https://datarecovery.com/wp-content/uploads/2017/08/hidden-tear-info.png 619w, https://datarecovery.com/wp-content/uploads/2017/08/hidden-tear-info-300x279.png 300w" sizes="auto, (max-width: 619px) 100vw, 619px" /></p>
<p>He <a href="https://www.utkusen.com/blog/destroying-the-encryption-of-hidden-tear-ransomware.html">explained his rationale for creating the malware</a> shortly after uploading it for public consumption.</p>
<p>Sen said that he wanted computer programming students to see examples of functional ransomware for educational purposes. When he learned about ransomware, there were not actual source-code samples to learn from. He wanted to change that for the next generation.</p>
<p>He had another motivation as well. Sen knew that unskilled hackers could buy ransomware-as-a-service on the dark web and launch attacks with it. Sen&#8217;s idea was to offer Hidden Tear for free to anyone who wanted it. He thought he could rid the market of ransomware-as-a-service by offering the same product for free.</p>
<p>Again, he wrote several flaws into the code so that any files encrypted by the malware could be decrypted. Sen thought that unskilled hackers would use his crackable ransomware because it was free; then, victims could decrypt their files using the built-in flaws.</p>
<p>Sen believed he was helping people who would&#8217;ve fallen victim to ransomware attacks anyway. If hackers were going to infect computers with ransomware, he reasoned, it may as well be with a crackable strain. Hidden Tear successfully gained a foothold in the crowded malware market, but in the process, Sen lost control of it.</p>
<h2>Soon, hackers began closing the backdoors and changing the code.</h2>
<p>Sen <a href="https://www.utkusen.com/blog/destroying-the-encryption-of-hidden-tear-ransomware.html">posted instructions</a> on how to decrypt files affected by Hidden Tear. Researcher <a href="https://twitter.com/demonslay335">Michael Gillespie</a> also <a href="https://www.bleepingcomputer.com/download/hidden-tear-decrypter/">created a decryptor</a> for many of the Hidden Tear variants. Unfortunately, some of the variants destroyed files instead of encrypting them. This meant that even with Gillespie&#8217;s clever decrypter, victims could not retrieve their files.</p>
<p>Within months of Sen publishing Hidden Tear&#8217;s source code in August 2015, security experts identified <a href="http://news.softpedia.com/news/open-source-hidden-tear-ransomware-spawns-24-other-ransomware-variants-499937.shtml">dozens of variants</a> created from it. Even two years later, new strains continue to victimize innocent people. Christiaan Beek, lead scientist and principal engineer at McAfee, recently <a href="https://twitter.com/ChristiaanBeek/status/899557658071633920">tweeted</a> that nearly 30 percent of new ransomware that the antivirus company discovered in June 2017 were based on Hidden Tear.</p>
<h2>Sen reluctantly took responsibility for the catastrophe.</h2>
<p>Sen himself has admitted that his <a href="https://www.utkusen.com/blog/im-sorry-for-hidden-tear-eda2.html">project was a failure</a>, though he offered several caveats to the admission. He says he partially achieved his goal of making it easier to decrypt victims&#8217; files. Of course, he also made it easier for criminals to encrypt files in the first place.</p>
<p>Sen says another goal was &#8220;destroying the business of ransomware code &amp; service sellers.&#8221; He claims to have had modest success in hurting the ransomware-as-a-service industry in 2016.</p>
<p>However, with names like <a href="https://www.utkusen.com/blog/destroying-the-encryption-of-hidden-tear-ransomware.html">BrainLag and Oxar</a>, new ransomware that uses Hidden Tear as a backbone continues popping up on a regular basis. It&#8217;s possible that these attacks would still occur even without Sen&#8217;s source code, but the programmer made life easier for cybercriminals.</p>
<p>To protect yourself from Hidden Tear variants and other ransomware, practice good internet hygiene. Never click suspicious links or attachments in emails and keep all software up-to-date.</p>
<p>Regularly back up all essential data so that you have options if ransomware affects your computer. Hidden Tear and dozens of other ransomware strains aren&#8217;t going away, but you can limit their effect by taking these simple precautions.</p>
<p>The post <a href="https://datarecovery.com/rd/hidden-tear-ransomware-still-wreaking-havoc/">Hidden Tear Ransomware Still Wreaking Havoc</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Petya Ransomware Infection And Decryption Services</title>
		<link>https://datarecovery.com/rd/petya-ransomware-infection-decryption-services/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Tue, 27 Jun 2017 21:36:27 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5341</guid>

					<description><![CDATA[<p>A Petya ransomware variant has swept through Europe in a fashion reminiscent of the <a href="https://datarecovery.com/rd/wannacrypt-ransomware-infection-decryption-services/">WannaCry attacks</a> of May 12, 2017. Like WannaCry, the Petya variant spreads using Eternal Blue and has affected the following businesses and organizations:</p>
<p>Utility companies, banks,...</p>
<p>The post <a href="https://datarecovery.com/rd/petya-ransomware-infection-decryption-services/">Petya Ransomware Infection And Decryption Services</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A Petya ransomware variant has swept through Europe in a fashion reminiscent of the <a href="https://datarecovery.com/rd/wannacrypt-ransomware-infection-decryption-services/">WannaCry attacks</a> of May 12, 2017. Like WannaCry, the Petya variant spreads using Eternal Blue and has affected the following businesses and organizations:</p>
<ul>
<li>Utility companies, banks, airports and supermarkets in Ukraine</li>
<li>Logistics company Maersk in the Netherlands</li>
<li>Food conglomerate Mondelez in Spain</li>
<li>Marketing firm WPP in the U.K.</li>
<li>Pharmaceutical giant Merck in the U.S.</li>
</ul>
<p>Tweets from around the world showed locked screens on ATMs, supermarket registers, and office computers with the same ransom note demanding $300 in Bitcoin.</p>
<blockquote class="twitter-tweet" data-lang="en">
<p dir="ltr" lang="en">All computers in our office are down. Global <a href="https://twitter.com/hashtag/Ransomware?src=hash">#Ransomware</a> attack. I&#8217;ve heard few other companies affected too. Backup and stay safe, guys. <a href="https://t.co/YNctmvdW2I">pic.twitter.com/YNctmvdW2I</a></p>
<p>— Mihir (@mihirmodi) <a href="https://twitter.com/mihirmodi/status/879678870471024640">June 27, 2017</a></p></blockquote>
<p><script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<p>If a Petya ransomware variant has infected your computer, turn it off, disconnect any media from it, and call Datarecovery.com at 1-800-237-4200. Our security experts will assess your situation and begin planning how to recover your files.</p>
<h2>What is Petya Ransomware (And How Does It Work)?</h2>
<p>Experts first detected <a href="https://www.symantec.com/connect/blogs/petya-ransomware-outbreak-here-s-what-you-need-know">Petya ransomware</a> in 2016. The malware differed from other types of ransomware in that it overwrote and encrypted a computer&#8217;s Master Boot Record preventing it from booting.</p>
<p>The recent attacks, which started on June 27, 2017, appear to be from a variant of Petya (which some experts are calling NotPetya). This new strain of ransomware is far more dangerous because it spreads laterally through networks using the Eternal Blue exploit.</p>
<p>To protect yourself from this Petya variant, <a href="https://researchcenter.paloaltonetworks.com/2017/06/unit42-threat-brief-petya-ransomware/">experts</a> recommend using <a href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx">this security update</a> from Microsoft, blocking inbound connections on TCP Port 445, and regularly maintaining back-ups of important files.</p>
<h3>Notable Features of Petya Ransomware Include:</h3>
<ul>
<li>Ransom note demands $300 bitcoin payment.</li>
<li>Email provider has shut down developer&#8217;s account making it impossible to notify attackers of paid ransom.</li>
<li>Victims include major companies and organizations in Ukraine, Russia, Netherlands, U.K., France, and United States.</li>
<li>Variant uses NSA&#8217;s Eternal Blue exploit to spread laterally through networks.</li>
</ul>
<p>The Petya variant targets the following file extensions:</p>
<p><em>.3ds, .7z., accdb, .ai, .asp, .aspx, .avhd, .back, .bak, .c, .cfg, .conf, .cpp, .cs, .ctl, .dbf, .disk, .djvu, .doc, .docx, .dwg, .eml, .fdb, .gz, .h, .hdd, .kdbx, .mail, .mdb, .msg, .nrg, .ora, .ost, .ova, .ovf, .pdf, .php, .pmf, .ppt, .pptx, .pst, .pvi, .py, .pyc, .rar, .rtf, .sln, .sql, .tar .vbox, .vbs, .vcb, .vdi, .vfd, .vmc, .vmdk, .vmsd, .vmx, .vsdx, .vsv, .work, .xls, .xlsx, .xvd, .zip</em></p>
<p>The above is not necessarily a comprehensive list but contains the known targeted extensions. In addition to encrypting the above files, Petya encrypts the Master File Tree and overwrites the Master Boot Record preventing computers from booting up altogether.</p>
<h2>How Does Petya Ransomware Infect My System?</h2>
<p>Researchers still have not pinpointed the initial vector of infection. One theory holds that an Office document attached to a spam email began the infection. Once the ransomware infects one computer on a network, the infection can spread laterally to out-of-date Windows machines.</p>
<h2>Can I Disable or Remove Petya Ransomware Encryption?</h2>
<p>There is no known decrypter for Petya ransomware or its variants. To make matters worse for victims, the email address of the attackers has been shut down. German email provider Posteo followed protocol and made the attacker&#8217;s account completely inaccessible once they learned of the incident.</p>
<p>With no working email address, there is no way to let the attackers know that a victim has paid the ransom. That leaves victims with no choice but to try to recover their files through other means. Datarecovery.com can assist you in locating back-up copies or in restoring partially encrypted files.</p>
<p>Contacting ransomware recovery experts as soon as possible gives victims the best chance at restoring their encrypted files. The specialists at Datarecovery.com have experience at removing malware and recovering seemingly lost documents. Call 1-800-237-4200 to start the process of restoring your files.</p>
<p>&nbsp;</p>
<p>The post <a href="https://datarecovery.com/rd/petya-ransomware-infection-decryption-services/">Petya Ransomware Infection And Decryption Services</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hidden Tear Ransomware Infection and Decryption Services</title>
		<link>https://datarecovery.com/rd/hidden-tear-ransomware-infection-decryption-services/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Fri, 09 Jun 2017 20:47:23 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5325</guid>

					<description><![CDATA[<p>Hidden Tear ransomware is an open-source malware program published by its developer for educational purposes. Though the author has since taken the source code offline, hackers around the world have already downloaded and redistributed it. Modified and improved variants of...</p>
<p>The post <a href="https://datarecovery.com/rd/hidden-tear-ransomware-infection-decryption-services/">Hidden Tear Ransomware Infection and Decryption Services</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hidden Tear ransomware is an open-source malware program published by its developer for educational purposes. Though the author has since taken the source code offline, hackers around the world have already downloaded and redistributed it. Modified and improved variants of the original Hidden Tear have now started to show up around the world.</p>
<p>If a Hidden Tear variant has infected your computer, turn it off, disconnect all media, and call Datarecovery.com at 1-800-237-4200. Our security experts can advise you on your options and begin the recovery process.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-5326" src="https://datarecovery.com/wp-content/uploads/2017/06/hidden-tear-ransomware-ascii-art.png" alt="Hidden Tear Ransomware ASCII art" width="453" height="138" srcset="https://datarecovery.com/wp-content/uploads/2017/06/hidden-tear-ransomware-ascii-art.png 453w, https://datarecovery.com/wp-content/uploads/2017/06/hidden-tear-ransomware-ascii-art-300x91.png 300w" sizes="auto, (max-width: 453px) 100vw, 453px" /></p>
<h2>What is Hidden Tear Ransomware and How Does It Work?</h2>
<p>Turkish programmer Utku Sen created Hidden Tear ransomware as an educational tool. He wrote a disclaimer on the site where others could download the source code, stating that the program was strictly educational. However, it wasn&#8217;t long before modified versions of the ransomware started infecting computers.</p>
<p><a href="https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/the-ongoing-development-of-hidden-tear-variants">Trend Micro</a> has already spotted several improved variants of Hidden Tear that allow victims to more easily pay ransoms. This trend follows the familiar pattern of ready-made malware giving attackers more time to focus on adding user-friendly features to increase payouts.</p>
<h3>Notable features of Hidden Tear ransomware include:</h3>
<ul>
<li>Open-source code allowed hackers to start with functional malware and improve it in a variety of ways.</li>
<li>Often has a more user-friendly interface (e.g. it can leave some files unencrypted or have a FAQ menu about payments).</li>
<li>Source code is behind many new variants such as <a href="http://blog.trendmicro.com/trendlabs-security-intelligence/new-open-source-ransomwar-based-on-hidden-tear-and-eda2-may-target-businesses/">KaoTear</a>, <a href="https://blog.malwarebytes.com/threat-analysis/2016/08/pokemongo-ransomware-comes-with-some-clever-tricks/">POGOTEAR</a>, and <a href="https://www.bleepingcomputer.com/news/security/new-fsociety-ransomware-pays-homage-to-mr-robot/">Fsociety</a>.</li>
</ul>
<p>The diversity of variants shows how big of a head start hackers have when they begin with viable malware. Instead of having to write sophisticated source code, they simply modify existing ransomware and add unique graphics or features. In the case of KaoTear, the attackers opened up an entirely new market by translating the ransom note into Korean and targeting a South Korean messaging app.</p>
<h2>How Does Hidden Tear Ransomware Infect My System?</h2>
<p>Because there are a variety of attackers distributing Hidden Tear variants, there&#8217;s no one particular vector of infection. However, due to its small file size of just 12 KB, attackers can easily hide the malware in an attachment to a phishing email. The POGOTEAR and KaoTear variants are disguised as a Pokemon app and a messaging app, which victims mistake for legitimate software.</p>
<p>Different variants of Hidden Tear target different files for encryption. A variant called May avoids encrypting files in several key directories to leave a computer more functional, presumably to make it easier to pay the ransom through an infected computer. A variant called MoWare targets the Desktop, Personal, MyMusic, and MyPictures folders. Because attackers can easily alter the source code, they can target any number of folders or files.</p>
<h2>Can I Disable or Decrypt Hidden Tear Ransomware?</h2>
<p>There is a freely available decrypter that works for many Hidden Tear variants. Due to the great variation within the ransomware family, this tool may or may not work for an infected computer. The security specialists at Datarecovery.com can assist you in determining what plan of action will most quickly restore your files.</p>
<p>If a Hidden Tear variant or other ransomware has infected your computer, call 1-800-237-4200 to speak with a malware expert. We can discuss your options and create a recovery plan to restore your files as soon as possible.</p>
<p>The post <a href="https://datarecovery.com/rd/hidden-tear-ransomware-infection-decryption-services/">Hidden Tear Ransomware Infection and Decryption Services</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 124/172 objects using Memcached
Page Caching using Disk: Enhanced 
Minified using Disk

Served from: datarecovery.com @ 2026-04-13 19:25:20 by W3 Total Cache
-->