Mallox ransomware: in-depth analysis and evolution

In this report, we provide an in-depth analysis of the Mallox ransomware, its evolution, ransom strategy, encryption scheme, etc. Continue reading Mallox ransomware: in-depth analysis and evolution

Head Mare: adventures of a unicorn in Russia and Belarus

Analysis of the hacktivist group Head Mare targeting companies in Russia and Belarus: exploitation of WinRAR vulnerability, custom tools PhantomDL and PhantomCore. Continue reading Head Mare: adventures of a unicorn in Russia and Belarus

How “professional” ransomware variants boost cybercrime groups

Kaspersky researchers investigated three ransomware groups that tapped newly built malware samples based on Babuk, Lockbit, Chaos and others, while lacking professional resources. Continue reading How “professional” ransomware variants boost cybercrime groups

ShrinkLocker: Turning BitLocker into ransomware

The Kaspersky GERT has detected a new group that has been abusing Microsoft Windows features by modifying the system to lower the defenses and using the local MS BitLocker utility to encrypt entire drives and demand a ransom. Continue reading ShrinkLocker: Turning BitLocker into ransomware

Using the LockBit builder to generate targeted ransomware

Kaspersky researchers revisit the leaked LockBit 3.0 builder and share insights into a real-life incident involving a custom targeted ransomware variant created with this builder. Continue reading Using the LockBit builder to generate targeted ransomware

Ransomware’s Impact Could Include Heart Attacks, Strokes & PTSD

New research details the possible effects of ransomware attacks on businesses and staff, society, the economy and national security, highlighting that its impact on mental and physical health is often overlooked. Continue reading Ransomware’s Impact Could Include Heart Attacks, Strokes & PTSD

Endpoint security in the cloud: What you need to know

Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their […]

The post Endpoint security in the cloud: What you need to know appeared first on Security Intelligence.

Continue reading Endpoint security in the cloud: What you need to know

Lockbit leak, research opportunities on tools leaked from TAs

In September of 2022, multiple security news professionals wrote about and confirmed the leakage of a builder for Lockbit 3 ransomware. In this post we provide the analysis of the builder and recently discovered builds. Continue reading Lockbit leak, research opportunities on tools leaked from TAs