•   
  •   
  •   

Money ThunderX: Security researchers render new ransomware harmless

15:10  28 september  2020
15:10  28 september  2020 Source:   t3n.de

Around Big Ten, students say football boosts morale, but some question players' access to tests

  Around Big Ten, students say football boosts morale, but some question players' access to tests Some students say the Big Ten's decision to delay the start of football season until October will result in stronger safety protocols.'This is the most magnificent stadium in the world': A preview of the new SoFi stadium

The ThunderX Ransomware ransom note. This type of malware has now been around for some time and The ThunderX file encryption is a complex procedure that renders your files inaccessible and that Brandon is a researcher and content creator in the fields of cyber- security and virtual privacy.

Typically ThunderX ransomware may exist as some legitimate software, for instance, in the pop-ups advising users to execute some important software Daniel Zimmermann has been writing on security and malware subjects for many years and has been working in the security industry for over 10 years.

Ransomware ThunderX unschädlich gemacht. © posteriori / Shutterstock Ransomware ThunderX rendered harmless.

That happened quickly: Just a few weeks after it first appeared, the new ThunderX ransomware was rendered harmless. The reason was, of all things, a bug in the Trojan.

The ransomware ThunderX has only been up to mischief since the end of August 2020. The encryption trojan attacks Windows systems. In order to get the files encrypted after a successful attack free again, affected users have to pay a ransom. Recently, ThunderX had spread rapidly. Now the Trojan's cyber career seems to be over - and a bug is responsible for that.

Security hole in Ransomware ThunderX

According to the online platform Bleeping-Computer , the security company Tesorion discovered a security hole in the ransomware ThunderX last week. The cybersecurity experts exploited a weak point in the Trojan when generating keys. In addition, a bug in so-called multi-threading helped security researchers to create a decryption tool, as Winfuture reports.

The five biggest questions to be answered in Week 3 of the college football season

  The five biggest questions to be answered in Week 3 of the college football season Week 3 in college football will be the last first weekend before the SEC starts play. The five biggest questions for teams taking field Saturdya.Predicting the CFP Playoff (given that Ohio State likely won't be in it)

ThunderX Ransomware is a new malware infection that attack on Windows Computer silently. ThunderX Ransomware is a harmful and notorious threat. It will keep creating new problems into your machine, so it very important to delete this malware permanently.

This month, security researcher Jakub Kroustek found a few new Dharma ransomware strains which encrypted the victim’s files with a “.betta” or “.xxxxx” extension. Now, in our research , we found another new type of Dharma ransomware , which goes undetected by almost all security solutions.

Victims of a ThunderX Trojan attack can now unlock their data for free. The decryption software can therefore make files accessible again that were encrypted with the current version of the ransomeware. These normally have the file extension .tx_locked, as Bleeping-Computer writes.

Download via the No More Ransomware project

The tool called ThunderX Decryptor can be downloaded via the No More Ransomware

project , on whose platform a whole range of keys for other ransomware can be found. When decrypting, however, users have to be very patient and follow the instructions that come with it. The first step is to remove the malware from the system.

More on the subject:

ransomware attack on Garmin: Smartwatch manufacturer probably paid millions in ransom

Ransomware: The Garmin failure is a minor thing against these 5 attacks

BSI and BKA on dealing with ransomware: Just do not pay!

Hackers hide fileless malware using Windows error reporting .
© DEFAULT_CREDIT Windows Logo (Image: Microsoft) The malicious code first reaches a system via a malicious e-mail attachment. When executed, it leaves no traces on a mass storage device. The camouflage via error reporting allows security applications to be tricked. Malwarebytes has discovered a new hacking campaign , in which fileless malware is used. It uses various techniques to evade detection by security applications.

—   Share news in the SOC. Networks
usr: 3
This is interesting!