Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
7 Scary Ransomware Families
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
lorraine89
50%
50%
lorraine89,
User Rank: Ninja
11/1/2016 | 8:52:13 AM
Cyber security
As holiday season nears, it is the by far most lucrative season for hackers and keyboard warriors to sneek into people's data for their monetary gains. Protect IP address with genuine vpn server like PureVPN that offers encryted online connection and those with strict no logs policy. 
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
10/27/2016 | 12:15:16 PM
Re: Jigsaw
Wow.  What a (scarily, saddeningly) clever way to still get something out of those who have had the foresight to back up their data (and, accordingly, otherwise wouldn't pay to get ransomed data unlocked).
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
10/27/2016 | 12:12:27 PM
Re: Jigsaw
@Dr.T: On top of that, it's a way for them to "double-dip."  First, pay up to get your data back.  Next, pay up so that no one else gets it.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
10/27/2016 | 12:11:24 PM
Re: Ransomware; new industry
@Dr.T: A big contributing factor to why this "industry" developed has to do with spam.  After the huge spam crackdown a few years ago, black-hatters had these botnets and malware under their control...but spamming was no longer particularly profitable or worth the risk for them.  Accordingly, they had to come up with new business models.

Enter ransomware.

Ironically enough, if we had left the spammers alone, we might not have seen this particular "innovation."
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/26/2016 | 3:17:20 PM
Re: Jigsaw
"... doxware ..."

I was reading about this the other day, obviously when the victim does not pay for the old files hackers still want to get someting out of it. 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/26/2016 | 3:14:54 PM
Re: Jigsaw
"... As companies grow aware of the threat of ransomware ..."

I say they are not. It looks like companies are willing to pay to get the data back instead of investing a good backup system.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/26/2016 | 3:12:32 PM
Re: Jigsaw
"... Jigsaw's scheme is particularly brilliant  ..."

there might be better ways but it is impressive.

 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
10/26/2016 | 3:09:30 PM
Re: candid photographer
" ... Excellent blog  ...":

Agree. Good information.
Dr.T
100%
0%
Dr.T,
User Rank: Ninja
10/26/2016 | 3:08:27 PM
Ransomware; new industry
I could not believe that there has been a new instruct created out of cyber-attacks. We are not in the right track at all.
ChandanaP946
50%
50%
ChandanaP946,
User Rank: Strategist
10/26/2016 | 9:21:53 AM
Re: Jigsaw
As companies grow aware of the threat of ransomware, threat actors are upping the ante with "doxware" by implementing features to ransomware that could leak a victim's data if ransoms aren't paid. https://cyware.com/news/ransomware-evolving-into-doxware-to-scare-victims-into-paying-say-researchers-eb443f2b
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-43056
PUBLISHED: 2021-10-28
An issue was discovered in the Linux kernel for powerpc before 5.14.15. It allows a malicious KVM guest to crash the host, when the host is running on Power8, due to an arch/powerpc/kvm/book3s_hv_rmhandlers.S implementation bug in the handling of the SRR1 register values.
CVE-2021-43057
PUBLISHED: 2021-10-28
An issue was discovered in the Linux kernel before 5.14.8. A use-after-free in selinux_ptrace_traceme (aka the SELinux handler for PTRACE_TRACEME) could be used by local attackers to cause memory corruption and escalate privileges, aka CID-a3727a8bac0a. This occurs because of an attempt to access th...
CVE-2021-3904
PUBLISHED: 2021-10-27
grav is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-3906
PUBLISHED: 2021-10-27
bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type
CVE-2021-3903
PUBLISHED: 2021-10-27
vim is vulnerable to Heap-based Buffer Overflow