article thumbnail

Ransomware world in 2021: who, how and why

SecureList

Hackers who are on the lookout for publicly disclosed vulnerabilities (1-days) in internet facing software, such as VPN appliances or email gateways. Set up offline backups that intruders cannot tamper with. Access sellers. According to our research , this malware affected almost 20 business sectors.

article thumbnail

Evolution of JSWorm ransomware

SecureList

Besides file encryption, it performs actions such as stopping a number of running processes and services to maximize the number of files available for encryption. In addition, it deletes all system backups, shadow copies, disables the system recovery mode, and clears event logs. Cryptographic scheme. Conclusion.