. The described attacks with LovxCrypt be done with an E-Mail attachment is supposedly an applicant’s curriculum vitae. Such a distribution method, even if it is no longer original, can cause apparently infections in enterprises.
also LovxCrypt as a new variant is opposed to the current trend of increasingly complex ransomware. Already CrypVault was based simply on Windows scripting languages. For cybercriminals, it is therefore relatively easy to create new variants by minor changes in the code. “As usual we see attackers who want – picking low hanging fruit with a little simple code to make a quick buck,” commented the Cylance threat guidance team in a blog .
as already in the previous CrypVault is the key component of a Windows batch file that controls all activities of malicious software. This includes the configuration of GnuPG-environment for the encryption of all important files on the victim’s computer. The batch file is also according to Cylance through some kind of spaghetti-code, which will complicate the analysis. Even random strings are included with, which had nothing to do with the task of the code at all. You were only used to avoid detection by conventional antivirus signatures.
after encryption the Ransomware creates a ransom demand. Each click on a encrypted files now with the extension of that. LOVX are provided, the blackmailer’s explanation that he needed a key to the deciphering of his files presented the victims.
‘as we have shown, is easy to create a functioning and effective Ransomware as LovxCrypt by the exclusive combination of scripting languages, as well as well-known encryption tools such as GnuPG”, close the safety experts from their analysis. “We expect to see even more of them.”
Cylance offers a ‘Next generation’ malware protection protect, based on machine learning. Protect was therefore trained with the “DNA marker of one billion known malicious and one billion known harmless files”. Previous investment measure a value of one billion dollars to the company. Competitors accused the security firm but with fake malware customers to advertise and to prevent independent testing.
get to know the building blocks of enterprise cloud platform in this audio Webinar. Learn how to achieve maximum freedom and flexibility for your applications. More outcome achieved with less input – specific application examples.