THANOS RANSOMWARE
- Get link
- X
- Other Apps
Ransomware has become one of the most important threats that we can find on the Internet. As we know, it is a type of malware that aims to encrypt our files and systems and later ask for a ransom in return. It really affects both the private users and the private companies. With the passage of time, hackers have also perfected their techniques. In this article, we are going to talk about Thanos, who has become the first ransomware to use the RIPlace technique to avoid detection.
Thanos, the first ransomware to use the RIPlace technique
It is true that we have more tools and techniques and
better quality antivirus
to protect ourselves. Systems are better prepared to detect threats like
ransomware. The problem is that cybercriminals have also perfected their techniques.
They improve the way in which they spread the threat and especially in how they
avoid being detected.
Thanos is one of the many
ransomware that are unfortunately on the network and that compromise the
security and privacy of users. However, it has an important novelty, and that
is that it is the first to use the RIPlace technique, something that allows it
to bypass security and make it more difficult to avoid it. This threat affects
Windows users.
It should be mentioned that Thanos is a RaaS ransomware,
or as a service, where it has affiliates who share the profits. This means that
there are more actors that can infect computers with this threat.
Now, what really makes Thanos different is the fact that
he uses the RIPlace technique. What does this technique consist of? It is a way
to evade the detection of ransomware by the system.
When the ransomware changes its file name in symbolic
code, than the anti-ransomware software is not at all able to detect that file.
That's what Thanos does, becoming the first ransomware known to use this
technique.
By activating this technique, your monitoring functions
would get an error, while the name change would still work and thus bypass the
anti-ransomware program.
Some antivirus modified their software
It should be noted that when this technique came in front
of companies and users many security tools regarded it as somewhat a
theoretical technique and that it would not actually be used. However, other security software
companies (the minority) modified their software to avoid this technique.
Now it seems that those responsible for Thanos have
decided to exploit this technique called RIPlace and thus become the first
ransomware to do so.
Ransomware, as we see, is a very important threat that is
very present in our daily lives. That is why we must always take measures to
avoid being victims.
MEASURES
TO TAKE
· Use
of virtual machines, which reduces the cases of infection by Ransomware.
· Inclusion
of access control lists for network mapped units.
· Installation
of JavaScript blockers for the browser that will prevent the execution of
scripts that are a possible threat to our computer.
WHAT
TO DO WHEN FACED WITH A RANSOMWARE INFECTION?
Although with a good prevention policy we can
considerably reduce the risk of suffering an attack, despite all the security systems that
exist today, minimizing threats by 100% is impossible.
The best defense against Ransomware is protection and
prevention, but if one of our computers is infected, it is important to have a
defined action protocol.
The first step is to disconnect the infected computers
from the network to stop sending information and reduce the risk of contagion.
Second, we will proceed to try to find out if the malware
is still running by dumping memory from the Windows Task Manager. In the case
of detecting the harmful process, we can stop it from the Administrator itself.
Finally, you should start the device in safe mode and
make a backup copy of all the data on the computer.
Once the infection is contained, it will be time for a
more in-depth evaluation of the consequences of the attack by the IT
technicians of the company or the companies and contracted cybersecurity solutions
that allow us to check the level of damage suffered, what information has been
lost, if it is recoverable and try to find out how the contagion occurred to
establish a higher level of security and prevent it from happening again.
- Get link
- X
- Other Apps
Comments
Post a Comment