Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Creepy New Ransomware Riffs Off Popular Horror Film
Threaded  |  Newest First  |  Oldest First
Whoopty
100%
0%
Whoopty,
User Rank: Ninja
4/20/2016 | 7:00:29 AM
Success rate?
As much as I would champion just taking the hit when others' systems are infected so as not to encourage the practice, I'd really struggle not to pay up if somehow all of my on and offline backups were encrypted. 

Do we know what kind of success rate these sorts of malware have and in the cases where people do pay up, is their data returned in working order?
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
4/20/2016 | 9:48:58 AM
Re: Success rate?
In 2015, victims paid a total of over $24 million in 2,453 reported ransomware attacks,

Here's a good piece we had on the dilemma ransomware victims face: http://www.darkreading.com/vulnerabilities---threats/ransomware-putting-companies-between-a-rock-and-a-hard-place/d/d-id/1324687
ArionHoward
50%
50%
ArionHoward,
User Rank: Apprentice
4/21/2016 | 10:16:09 AM
Re: Success rate?
Thank you Kelly! Loved this article from March. To technical careers, prevention seems so simple with a fully robust business continuity plan that covers the whole company by knowing the worth of all of your data classes, backing them up and testing a full recovery playout regularly. Hospitals, lawyers & police departments are most vulnerable with a lack of technical expertise like cloud service providers, but having been involved with some big full scale breeches a cyberwar is more common than mother natures emergencies that provide more warnings.
ArionHoward
50%
50%
ArionHoward,
User Rank: Apprentice
4/21/2016 | 10:16:14 AM
Re: Success rate?
Thank you Kelly! Loved this article from March. To technical careers, prevention seems so simple with a fully robust business continuity plan that covers the whole company by knowing the worth of all of your data classes, backing them up and testing a full recovery playout regularly. Hospitals, lawyers & police departments are most vulnerable with a lack of technical expertise like cloud service providers, but having been involved with some big full scale breeches a cyberwar is more common than mother natures emergencies that provide more warnings.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
4/20/2016 | 6:35:35 PM
A new meaning to "Scareware"
Reminds me of a prank I read about many years ago that went something like this: Get access to your local super-paranoid libertarian's computer, and install a program that, at a given time while being used, will lock up their computer, make it go blank, then simply put the words "They are coming..." on the screen.

Then, queue the helicopter sound effects.
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
4/20/2016 | 7:00:33 PM
Re: A new meaning to "Scareware"
Well, we are in an election year...
Nitsan@Cymmetria
50%
50%
[email protected],
User Rank: Author
4/21/2016 | 7:40:31 PM
Re: A new meaning to "Scareware"
you can say that again..this is one creepy malware.


Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This gives a new meaning to blind leading the blind.
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-28815
PUBLISHED: 2021-06-16
Insecure storage of sensitive information has been reported to affect QNAP NAS running myQNAPcloud Link. If exploited, this vulnerability allows remote attackers to read sensitive information by accessing the unrestricted storage mechanism. This issue affects: QNAP Systems Inc. myQNAPcloud Link vers...
CVE-2021-3535
PUBLISHED: 2021-06-16
Rapid7 Nexpose is vulnerable to a non-persistent cross-site scripting vulnerability affecting the Security Console's Filtered Asset Search feature. A specific search criterion and operator combination in Filtered Asset Search could have allowed a user to pass code through the provided search field. ...
CVE-2021-32685
PUBLISHED: 2021-06-16
tEnvoy contains the PGP, NaCl, and PBKDF2 in node.js and the browser (hashing, random, encryption, decryption, signatures, conversions), used by TogaTech.org. In versions prior to 7.0.3, the `verifyWithMessage` method of `tEnvoyNaClSigningKey` always returns `true` for any signature that has a SHA-5...
CVE-2021-32623
PUBLISHED: 2021-06-16
Opencast is a free and open source solution for automated video capture and distribution. Versions of Opencast prior to 9.6 are vulnerable to the billion laughs attack, which allows an attacker to easily execute a (seemingly permanent) denial of service attack, essentially taking down Opencast using...
CVE-2021-32676
PUBLISHED: 2021-06-16
Nextcloud Talk is a fully on-premises audio/video and chat communication service. Password protected shared chats in Talk before version 9.0.10, 10.0.8 and 11.2.2 did not rotate the session cookie after a successful authentication event. It is recommended that the Nextcloud Talk App is upgraded to 9...