News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

IT security: Basis for LockBit 4.0 defused
Trend Micro News

In collaboration with the UK's National Crime Agency (NCA), Trend Micro analyzed the in-development and unreleased version of the LockBit encryptor, rendering the entire product line unusable to cybercriminals in the future. As a criminal group, LockBit was known for innovating and trying new things. In the course of this innovative development, LockBit has released several versions of its ransomware, from version v1 (January 2020) to LockBit 2.0 (nicknamed “Red”, from June 2021) to LockBit 3.0 (“Black”, from March 2022). In October 2021, the Linux threat actor introduced…

Read more

Hope: Black Basta data decryption tool
B2B Cyber ​​Security ShortNews

Hackers also make mistakes: According to a report on GitHub, the experts at SRLabs have discovered a vulnerability in the Black Basta ransomware. You were then able to build a decryption tool, which can probably save the data in many cases. The APT group Black Basta has caused a lot of damage with its ransomware. Many of the companies affected did not take part in the blackmail, but they often lost some data. Now there is hope again for the recovery of some data: the experts at SRLabs have discovered a vulnerability in the ransomware of...

Read more

Microsoft DCOM hardening tool discovers vulnerabilities
B2B Cyber ​​Security ShortNews

Open-source detection tool uncovers vulnerabilities in DCOM ahead of Microsoft's March 2023 patch. Users can quickly determine if their networks contain unsecured DCOM made unusable by the new Microsoft patch. OTORIO has released the open-source Microsoft Distributed Component Object Model (DCOM) Hardening Toolkit. The aim is to protect OT systems from possible problems related to an upcoming Microsoft patch. Because Microsoft itself writes: “14. March 2023, hardening changes are enabled by default with no option to disable them. At this point, you must resolve any compatibility issues with the hardening changes and applications in your environment." Test,…

Read more

CISA supplies ESXi Args Recover tool for data recovery
B2B Cyber ​​Security ShortNews

During the severe cyber attacks on thousands of older, unpatched VMare ESXi servers, many virtual machines were infected and encrypted with the ESXiArgs ransomware. ESXiArgs-Recover is a CISA tool that has already been able to recover data in some cases. CISA is aware that some companies have reported successful file recovery without paying a ransom. CISA compiled this tool based on publicly available resources, including a tutorial by Enes Sonmez and Ahmet Aykac. This tool reconstructs virtual machine metadata from virtual disks that were not encrypted by the malware….

Read more

Danger check: self-hacking tool for companies
Danger check: self-hacking tool for companies

A new, free self-hacking tool allows companies to safely hack their own network and check their DNS security. EfficientIP introduces the tool for detecting the risk of data exfiltration in companies. The free self-hacking tool, a DNS-based data exfiltration application, is free for companies to use. Designed as an easy-to-use online tool, the application enables organizations to easily and securely conduct their own 'ethical hack' of their DNS systems and associated security measures. In this way, vulnerabilities can be uncovered that lead to a greater security gap in the network and thus also to a data leak...

Read more

Bitdefender decryptor against RanHassan ransomware
Bitdefender_News

Victims of the RanHassan ransomware can now decrypt their data again using a universal Bitdefender decryptor. Bitdefender now provides 22 decryptors. The ability to decrypt data yourself is the best way to thwart ransomware attacks. Bitdefender's continued development of one of the industry's most comprehensive ransomware decryption programs has saved many companies from having to pay ransoms - estimated at around $XNUMX billion in total. Bitdefender's top decryption tools include tools for victims of Gandcrab attacks, as well as a universal decryptor against REvil ransomware….

Read more

Hades family ransomware decryption tool
B2B Cyber ​​Security ShortNews

Luckily, ransomware programmers make mistakes too, so Avast's specialists were able to develop a decryption tool for the Hades family's MafiaWare666 ransomware. MafiaWare666 is also known as JCrypt, RIP Lmao or BrutusptCrypt. Avast releases MafiaWare666 ransomware decryption tool. MafiaWare666 is a ransomware strain written in C# that does not contain any obfuscation or anti-analysis techniques. It encrypts files using AES encryption. Avast discovered a vulnerability in the encryption scheme that allows decrypting some of the variants without paying the ransom. New or previously unknown samples may encrypt files differently, so they may not be decrypted without further analysis...

Read more

LockerGoga ransomware decryption tool
Bitdefender_News

Bitdefender provides a universal decryption (decryptor) tool that helps victims of all previous LockerGoga ransomware attacks to recover their encrypted files. As always, the tool is also available via the NoMoreRansom initiative. Europol, the NoMoreRansom initiative, the Zurich public prosecutor's office and the Zurich canton police were involved in the development of the decryptor, which is freely available for download. LockerGoga: Damage over 100 million US dollars Cyber ​​experts observed the LockerGoga family for the first time in 2019. The ransomware became known through successful attacks on the Norsk Hydro in Norway and through attacks in the United States. The criminal operators who are also behind the MegaCortext ransomware…

Read more

Forensic tool cracks Windows Hello PIN codes
Forensic tool cracks Windows Hello PIN codes

ElcomSoft cracks Windows Hello PIN codes with its forensics tool and attacks the LUKS2 encryption. This extends the range of forensic password recovery tools to include support for Windows Hello PIN codes on TPM-less computers. There is also support for the new LUKS2 specification for encrypted disks and containers in Linux. Microsoft implements PIN codes as part of Windows Hello authentication and recommends using PIN codes instead of a password. By default, PIN codes contain only digits, but alphanumeric PINs are also possible. While 4- to 6-digit PINs can be cracked in minutes, attacking an alphanumeric PIN…

Read more

Yanluowang ransomware – Kaspersky provides decryption tool
Kaspersky_news

Cisco has confirmed that the Yanluowang ransomware group has entered its corporate network. However, no sensitive data is said to have been stolen or encrypted. Kaspersky provides a free decryption tool for victims of the Yanluowang group. Yanluowang is a relatively new ransomware used by unknown attackers to target large companies. It was first reported late last year. Although the malware has only been on the market for a short time, Yanluowang has managed to target companies from all over the world including USA, Brazil, Germany, UAE, China, Turkey and many more countries. Included…

Read more