0 Dokumentacja)
We found results matching "0" in 0 ms
  • Antivirus vendors push fixes for EFS ransomware attack method

    Czas: Jan. 23, 2020

    Researchers have discovered how an EFS attack triggered by ransomware makes systems based on signature-based antivirus solutions vulnerable.


    Amit Klein, vice president of security research at Safebreach Labs, announced an investigation into how ransomware can exploit the Windows encryption file system, a type of malware that encrypts systems and should be detected.


    A laboratory investigation conducted by EFS, developed by Microsoft as an NTFS alternative to fully encrypt the BitLocker disk to encrypt individual files or directories, found that important antivirus solutions may not protect the system.


    In a blog post, Safebreach Labs said that after trying three key anti-ransomware solutions offered by cybersecurity providers, all three attacks could not be blocked.


    The security solutions tested were ESET Internet Security 12.1.34.0, Kaspersky Anti Ransomware 4.0.0.861 and Microsoft Windows 10 Controlled Folder Access on Windows 10 64 bit version 1809 using a Windows 10 virtual machine loaded with a variety of different contents and types of files.


    Safebreach Labs tested whether EFS could be exploited by creating its own ransomware variant, which uses tactics such as generating keys and certificates. To start the attack chain, the ransomware created both and added the certificate to the personal certificate store, with the new key assigned as the current EFS key and requested the deletion of files or folders.


    If possible, the malware removes the loose parts of the hard drive and then encrypts the data in the key file with a public key connected to the ransomware. At this point, it is also possible to send stolen information to an attacker's command and control center.


    According to the researchers, EFS-based ransomware encryption activities take place in the kernel and, as the NTFS driver is involved, they can also go unnoticed for file system filtering drivers. No human interaction or administrative rights are required.


    However, the lock icons appear when the files are encrypted, which can give victims an indication that everything is wrong, and when the Data Recovery Agent is activated, recovery can be "trivial," the equipment.


    Safebreach Labs developed a proof of concept code and provided it to 17 cybersecurity providers. As a result, the team discovered that more products were affected than expected.


    One possible solution is for administrators to modify registry keys to disable EFS and use Group Policy in company settings. However, if EFS is used actively and legally, disabling the configuration may affect the required file protection.


    Najnowsze wiadomości: Protect Your Data with AOMEI Backupper

    Następne wiadomości: Kaspersky Anti-Virus Review

BliskoWitamy w bzfuture Zaloguj się.

New users register get 30% discount BTS30 for software products

Nie jesteś jeszcze zarejestrowany?   Zapisz się teraz

Zaloguj się za pomocą konta strony trzeciej:

  • google
  • Twitch
  • Youtube

BliskoWitamy w bzfuture Zarejestruj się.

30% discount code: BTS30 for all software products
  • Adres e-mail *(Used To Receive Key)

    Proszę wpisać prawidłowy email.

  • Hasło*

    6 do 16 liter, cyfr i znaków specjalnych.

  • Potwierdź hasło*

  • Imię* Nazwisko*

  • Przeczytałem i zgodziłem się na 
    Zapisz się do ofert bzfuture, newslettera konkursów.

Masz już konto bzfuture?   Zapisz się teraz

Zaloguj się za pomocą konta strony trzeciej

  • google
  • Twitch
  • Youtube

Blisko

Skłonić:

increase-the_programe_has_been_successfully

Blisko

Skłonić:

increase-the_programe_has_been_successfully

Blisko

Skłonić:

System jest zajęty. Poczekaj i spróbuj ponownie.

BliskoRejestracja udana

BliskoKontrola bezpieczeństwa

You have an unextracted key !
Do Twojego koszyka została dodana nowa pozycja.