Posts Tagged ‘ransomeware’

Most Recent
 
Read More
2018-07-12

What you should know about ransomware

A huge number of new viruses appear every year in the world, some of which cause notable harm not only to ordinary people, but also to large firms. About 90 million new viruses were created in the world in 2017, and about 300,000 are created daily.

240
 
Read More
2017-10-22

How to decrypt files after a ransomware attack

Attacks using encryption viruses have become a true trend in 2017. Such attacks were recorded a lot, but the loudest of them were WannaCry and NotPetya. Restoring hard disks encrypted with Petya / NotPetya is a tedious, but possible, task.

 

308
 
Read More
2017-06-23

WANNACRY ON INDUSTRIAL NETWORKS

In mid-May 2017, many companies around the world were attacked by the WannaCry network crypto variant. The Wannacle malware spread across local networks and the Internet by exploiting the CVE-2017-0143 (MS17-010) vulnerability in components of the SMBv1 service (port TCP 445) in Windows operating systems. Since the industrial network is not directly connected to the Internet, and access is provided through the corporate network using NAT, a firewall and a corporate proxy server, which makes it impossible to infect such systems via the Internet. There are typical industrial network configuration errors, which have led to WannaCry infections, according to our data:

 

108
 
Read More
2017-02-24

New ransomware targeting MacOS

Malware experts fromESET have discovered a new file-encrypting ransomware. They called it OSX/Filecoder.E.  The ransomware targeting MacOS that is being distributed through bittorrent websites. OSX/Filecoder.E has written in Swift.

 

80
Latest Headlines
 
Read More
661
 
Read More
370
 
Read More
738

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
digital forensics software
Android forensics
windows forensics
incident response
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
An Overview of Web Browser Forensics