This double extortion technique has become common among the most successful ransomware operations. The cyber criminals behind Lorenz steal data before encrypting it and attempt to use this as additional leverage in the attack by threatening to publish the stolen information if the ransom isn't paid. Lorenz ransomware first emerged in April this year and those behind it have targeted organisations around the world. The decryption key for Lorenz ransomware is the 120th decryptor to be made available on No More Ransom since the project began in 2016. No More Ransom is a joint project by law enforcement agencies including Europol's European Cybercrime Centre, along with partners across Europe in cybersecurity and academics, which aims to disrupt the business of ransomware gangs by providing decryption keys that allow victims to retrieve their files without paying a ransom. SEE: Cybersecurity: Let's get tactical (ZDNet/TechRepublic special feature) | Download the free PDF version (TechRepublic) These certifications can help you enter an industry with a high demand for skilled staff.īut following analysis of the malware, researchers at Dutch cybersecurity company Tesorion found that were able to engineer a decryption tool for Lorenz ransomware – and now it's available for free via No More Ransom.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |