HomeCyber BalkansNew ransomware group Funksec benefits from LLMs

New ransomware group Funksec benefits from LLMs

Published on

spot_img

In recent cyber attack news, a new ransomware program has been discovered by security researchers. The ransomware program contains a ransom demand identifying the group as Funksec, with an alternative ransom demand pointing to a group called Ghost Algeria. Additionally, the author of the program failed to remove compilation variables, revealing a visible path in the source code as C:\Users\Abdellah\.

The ransomware program utilizes well-known PowerShell script techniques to gain elevated permissions. It then proceeds to disable the real-time protection service of Windows Defender, removes security event logging on the system, removes restrictions on PowerShell execution, and finally deletes copies to prevent system restoration.

Afterwards, the malware program attempts to terminate a long list of processes related to various programs, including browsers, video players, messaging applications, and Windows services. This ensures that access to potentially important files, which are subsequently encrypted, is not blocked by these applications.

The discovery of this ransomware program serves as a reminder of the ongoing threat posed by cyber attacks and the importance of implementing robust cybersecurity measures. As technology continues to advance, so do the tactics employed by cybercriminals, highlighting the need for constant vigilance and proactive defense strategies.

Security experts advise organizations and individuals to regularly update their security software, maintain strong password practices, exercise caution when clicking on links or downloading attachments from unknown sources, and regularly back up important data to prevent loss in the event of a ransomware attack.

It is crucial for businesses to prioritize cybersecurity and invest in employee training to increase awareness of potential threats. By staying informed about the latest trends in cyber attacks and taking proactive steps to mitigate risks, organizations can better protect themselves and their sensitive information from falling victim to malicious actors.

As the cybersecurity landscape continues to evolve, it is essential for individuals and organizations to adapt and strengthen their defenses against cyber threats. By working together and staying informed, we can create a safer online environment for all users.

Source link

Latest articles

XE Group transitions from credit card skimming to exploiting zero-day vulnerabilities

In a recent shift of tactics, the notorious cybercrime group XE Group has transitioned...

Hackers infiltrate Microsoft IIS services through Cityworks RCE vulnerability

Hackers have successfully exploited a critical vulnerability in Cityworks deployments, a software used for...

Information about Home Office Apple iCloud access and FBI message scam alert

The UK Home Office, a government body overseeing key functions such as immigration, national...

Top 5 NIS2 Compliance Software and Solution Providers from heimdalsecurity.com

The Network and Information Systems Directive 2 (NIS2) has been officially implemented by the...

More like this

XE Group transitions from credit card skimming to exploiting zero-day vulnerabilities

In a recent shift of tactics, the notorious cybercrime group XE Group has transitioned...

Hackers infiltrate Microsoft IIS services through Cityworks RCE vulnerability

Hackers have successfully exploited a critical vulnerability in Cityworks deployments, a software used for...

Information about Home Office Apple iCloud access and FBI message scam alert

The UK Home Office, a government body overseeing key functions such as immigration, national...