satan_lab_620_300  - satan lab 620 300 - Satan Ransomware Spawns New And Innovative Methods to Spread

It’s a worrying trend that isn’t going away. Worse, it’s constantly adapting to include brand new exploits/techniques and spreads in more and successful ways.

Today, we are sharing an example of how previously known malware keeps evolving and adding new techniques to infect more systems.

BleepingComputer first reported on ransomware in January 2017. Recently, Ransomware was identified as using the EternalBlue exploit to across compromised environments.

This is the same exploit associated with a previous WannaCry Ransomware . While Microsoft patched the vulnerability associated with EternalBlue in March 2017, many environments remain vulnerable.

IT security provider Alienvault identified samples of Satan Ransomware that not only include EternalBlue, but also a far larger set of propagation , variant attempts to propagate through:

  • JBoss CVE-2017-12149
  • Weblogic CVE-2017-10271
  • EternalBlue exploit CVE-2017-0143
  • Tomcat web brute forcing

Here is their website with the technical details:

How vulnerable is your network against ransomware infections? 

Bad guys are constantly coming out with new versions of ransomware strains to evade detection. Is your network effective in blocking ransomware when fall for social engineering attacks? 

KnowBe4’s Ransomware Simulator “RanSim” gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 10 ransomware infection scenarios and show you if a workstation is vulnerable to infection. 

Here’s how RanSim works:

Download RanSim Here:

NOTE: Created for Windows-based workstations running Windows 7+. RanSim does not alter any existing files on disk.  As part of the simulation RanSim does enumerate all files on the local disk(s). For the purposes of encryption, simulated data files are downloaded from the Internet.


Source link
Based Blockchain Network


Please enter your comment!
Please enter your name here