While the CE Niehoff team was trying to suppress the spread of the ransomware, the attackers launched a reverse-shell attack, exploiting an unpatched vulnerability in Java. The generator manufacturer's Vipre anti-malware tools did not detect this type of attack. With stolen user credentials, the ransomware operators connected to the network via Remote Desktop Protocol (RDP) and used PowerShell commands server by server to mask Ryuk's network activity.
: by turning off some of the infected servers at the start of the attack, his team only made the problem worse by disrupting the ransomware’s infection scheme. The problem was that the india whatsapp data missed the ransom demand and the warning that they should not turn off the servers or they would risk damaging the system. “The expectation was that we would see the ransom message on Monday morning, not Sunday. Turning off the machines was a mistake on my part. The encryption scheme of the malware is designed in such a way that turning off the power disables the firmware on all servers, including the email and ERP servers, which is what happened. Even if we wanted to pay the ransom, we couldn’t,” Laru recalls.
The ransom demand stated that the hackers' help was required to decrypt the files, and that resetting or shutting down the systems could damage them. The hackers did not promise to send decryption codes for the ransom, but instead promised to establish contact with the victim so that they could decrypt the files themselves. Larue said he was in shock when he realized that he would not be able to access his files and systems even after paying the ransom.
Laru focused on one important detail
-
- Posts: 542
- Joined: Mon Dec 23, 2024 3:13 am