article thumbnail

Oops! Black Basta ransomware flubs encryption

Malwarebytes

Researchers at SRLabs have made a decryption tool available for Black Basta ransomware, allowing some victims of the group to decrypt files without paying a ransom. The decryptor works for victims whose files were encrypted between November 2022 and December 2023. How to avoid ransomware Block common forms of entry.

article thumbnail

New DeadBolt Ransomware Targets NAT Devices

Schneier on Security

There’s a new ransomware that targets NAT devices made by QNAP: The attacks started today, January 25th, with QNAP devices suddenly finding their files encrypted and file names appended with a.deadbolt file extension.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Rhysida Ransomware Cracked, Free Decryption Tool Released

The Hacker News

Cybersecurity researchers have uncovered an "implementation vulnerability" that has made it possible to reconstruct encryption keys and decrypt data locked by Rhysida ransomware. The findings were published last week by a group of researchers from Kookmin University and the Korea Internet and Security Agency (KISA).

article thumbnail

Hive Ransomware Now Encrypts Linux and FreeBSD Operating Systems

Heimadal Security

The double-extortion ransomware group dubbed Hive also encrypts Linux and FreeBSD with new malware versions designed specifically for these operating systems. The post Hive Ransomware Now Encrypts Linux and FreeBSD Operating Systems appeared first on Heimdal Security Blog.

article thumbnail

How Ransomware Uses Encryption – And Evolves

eSecurity Planet

Ransomware attacks are a huge concern these days, especially for corporate networks. Indeed, when the ransomware reaches its target, it’s practically game over. The malware encrypts files and spreads to the entire system to maximize damage, which forces companies to lock down the whole network to stop the propagation.

article thumbnail

Magniber Ransomware Shifts Attention Now to Internet Explorer Vulnerabilities

Heimadal Security

A change of focus took place in the Magniber ransomware’s gang attack method arsenal, as now the threat actor group started to propagate the ransomware and encrypt users’ devices by means of two Internet Explorer vulnerabilities.

article thumbnail

Magniber ransomware gang now exploits Internet Explorer flaws in attacks

Bleeping Computer

The Magniber ransomware gang is now using two Internet Explorer vulnerabilities and malicious advertisements to infect users and encrypt their devices. [.].

Internet 101