Remove Analysis Remove Encryption Remove Examples Remove Libraries
article thumbnail

Microsoft details techniques of Mac ransomware

Security Affairs

One of the most important capabilities of ransomware is the capability of targeting specific files to encrypt. FileCoder and MacRansom use the Linux find utility to search for selected files to encrypt. . “The ransomware families we analyzed often share similar anti-analysis and persistence techniques. _README_”. .

article thumbnail

Experts warn of attacks using a new Linux variant of SFile ransomware

Security Affairs

Some variants of the ransomware append the English name of the target company to the filenames of the encrypted files. “For example, the variant captured this time uses nuctech-gj0okyci (nuctech is the English name of Nuctech Technology Co., as the suffix name. . as the suffix name. ” reported The Record. .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Strong Encryption Explained: 6 Encryption Best Practices

eSecurity Planet

Strong encryption protects data securely from unauthorized access, but the specific algorithms that qualify as strong encryption change over time as computing power increases and researchers develop new ways to break encryption. What Makes an Encryption Algorithm Strong?

article thumbnail

Hackers Are Now Exploiting Windows Event Logs

eSecurity Planet

The system uses DLL (Dynamic Link Library) files to store some resources the application needs and will load automatically. If it does not find one, the encrypted shell code is written in 8KB chunks in the event logs. The malware analysis by Kaspersky is quite remarkable and detailed. Also read: How Hackers Evade Detection.

article thumbnail

JSWorm: The 4th Version of the Infamous Ransomware

Security Affairs

Technical Analysis. JSWorm encrypts all the user files appending a new extension to their name. During the encryption phase, the ransomware creates an HTML Application “JSWRM-DECRYPT.hta” in each folder it encounters. The malware encrypts all the files whose extension is not present in the list. The Encryption Scheme.

article thumbnail

Attor malware was developed by one of the most sophisticated espionage groups

Security Affairs

” reads the analysis published by ESET. “For example, in order to be able to report on the victim’s activities, Attor monitors active processes to take screenshots of selected applications. The Attor malware makes sophisticated use of encryption to hide its components. ” continues the analysis.

article thumbnail

Buran ransomware-as-a-service continues to improve

Security Affairs

Buran is advertised as a stable malware that uses an offline cryptoclocker , 24/7 support, global and session keys, and has no third-party dependencies such as libraries. “In our analysis we detected two different versions of Buran, the second with improvements compared to the first one released.”