MENU

Posts Tagged ‘Ransomware forensics’

Most Recent
 
Read More
2017-12-25

Using FSRM to Prevent Ransomware

The File Server Resource Manager is a Windows server, 2016 and 2012 R2 Role. This role allows you to add fine-grained quotas to folders, it allows you to automate the task window files.

192
 
Read More
2017-10-22

How to decrypt files after a ransomware attack

Attacks using encryption viruses have become a true trend in 2017. Such attacks were recorded a lot, but the loudest of them were WannaCry and NotPetya. Restoring hard disks encrypted with Petya / NotPetya is a tedious, but possible, task.

 

353
 
Read More
2017-06-23

WANNACRY ON INDUSTRIAL NETWORKS

In mid-May 2017, many companies around the world were attacked by the WannaCry network crypto variant. The Wannacle malware spread across local networks and the Internet by exploiting the CVE-2017-0143 (MS17-010) vulnerability in components of the SMBv1 service (port TCP 445) in Windows operating systems. Since the industrial network is not directly connected to the Internet, and access is provided through the corporate network using NAT, a firewall and a corporate proxy server, which makes it impossible to infect such systems via the Internet. There are typical industrial network configuration errors, which have led to WannaCry infections, according to our data:

 

126
 
Read More
2017-06-03

Why RAM imaging in ransomware cases is a must

 

The Ransomware is the scourge of our time. No one is immune from seeing a demand to pay hackers money on the screen of his computer, laptop or mobile phone. Usually, hackers encrypt user files in case these files may be important to the user and he is ready to spend a certain amount of money for deciphering them.

 

1351
Latest Headlines
 
Read More
875
 
Read More
461
 
Read More
894

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
Android forensics
digital forensics software
windows forensics
forensic data recovery
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Android forensic analysis with Autopsy

Get Help Now

Thank you for contacting us.
Your Digital Investigator will call you shortly.