{"id":18522,"date":"2022-03-17T03:20:56","date_gmt":"2022-03-17T11:20:56","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/03\/17\/news-12255\/"},"modified":"2022-03-17T03:20:56","modified_gmt":"2022-03-17T11:20:56","slug":"news-12255","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/03\/17\/news-12255\/","title":{"rendered":"The Ransomware Threat Intelligence Center"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/Sophos-News-banner-4-march-1200x628-1.png\"\/><\/p>\n<p><strong>Credit to Author: Tilly Travers| Date: Thu, 17 Mar 2022 09:13:50 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p>&nbsp;<\/p>\n<h3>Introduction<\/h3>\n<p>The ransomware landscape is a complex, crowded and rapidly evolving ecosystem. New and rebranded groups appear and disappear continuously, while the operators behind them share, rent, steal, or copy each other\u2019s attack tools, playbooks and even infrastructure.<\/p>\n<p>Sophos has been monitoring and reporting on the ransomware landscape for years, building an unrivalled library of insight and analysis. The <strong>Ransomware Threat Intelligence Center<\/strong> brings together a curated list of the most important research articles and reports published by Sophos on prevalent, new, and emerging ransomware threats, including their tools, techniques, and behaviors, from 2018 to the present. The content will be updated regularly as new material becomes available.<\/p>\n<p>For further information on ransomware, including advice on security best practice and the latest <a href=\"https:\/\/secure2.sophos.com\/en-us\/security-news-trends\/whitepapers\/gated-wp\/ransomware-cyberthreat\">State of Ransomware<\/a> report, visit Sophos&#8217; <a href=\"https:\/\/www.sophos.com\/en-us\/content\/ransomware\">Resources to Stop Ransomware.<\/a><\/p>\n<h3>Sophos Research and Reports on Prevalent and New Ransomware Groups, 2018 to 2022<\/h3>\n<h4><strong>Astro Locker<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/03\/31\/sophos-mtr-in-real-time-what-is-astro-locker-team\/\">Sophos MTR in real time: What is Astro Locker team?<\/a><\/p>\n<p>March 31, 2021 \u2013 A Sophos incident response investigation uncovers similarities between Astro Locker and Mount Locker ransomware<\/p>\n<h4><strong>Avos Locker<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/12\/22\/avos-locker-remotely-accesses-boxes-even-running-in-safe-mode\/\">Avos Locker remotely accesses boxes, even running in Safe Mode<\/a><\/p>\n<p>Dec. 22, 2021 \u2013 Sophos reports how the relatively new ransomware-as-a-service (RaaS), Avos Locker boots target computers into Safe Mode to execute the ransomware and tries to disable security software<\/p>\n<h4><strong>Atom Silo<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/10\/04\/atom-silo-ransomware-actors-use-confluence-exploit-dll-side-load-for-stealthy-attack\/\">Atom Silo ransomware actors use Confluence exploit, DLL side-load for stealthy attack \u00a0 <\/a><\/p>\n<p>Oct. 4, 2021 \u2013 Sophos reports on an attack by the relatively new ransomware group Atom Silo that leveraged a recent vulnerability in Atlassian\u2019s Confluence collaboration software and tried to disrupt endpoint protection software. The Confluence vulnerability was also exploited by a crypto miner<\/p>\n<h4><strong>Avaddon<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/05\/24\/what-to-expect-when-youve-been-hit-with-avaddon-ransomware\/\">What to expect when you\u2019ve been hit with Avaddon ransomware<\/a><\/p>\n<p>May 24, 2021 \u2013 Part of a series designed to help IT administrators facing the impact of an attack involving a particular ransomware family<\/p>\n<h4><strong>Black Kingdom<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/03\/23\/black-kingdom\/\">Black Kingdom ransomware begins appearing on Exchange servers<\/a><\/p>\n<p>March 23, 2021 \u2013 Sophos reports on a novel, if fairly basic ransomware targeting Microsoft Exchange servers that haven\u2019t been patched against the <a href=\"https:\/\/news.sophos.com\/en-us\/2021\/03\/17\/mtr-in-real-time-exchange-proxylogon-edition\/\">ProxyLogon<\/a> exploit<\/p>\n<h4><strong>BlackMatter<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/08\/09\/blackmatter-ransomware-emerges-from-the-shadow-of-darkside\/\">BlackMatter ransomware emerges from the shadow of DarkSide<\/a><\/p>\n<p>Aug. 9, 2021 \u2013 Sophos reports on a new RaaS that calls itself BlackMatter and adopts tools and techniques from REvil, DarkSide and LockBit 2.0<\/p>\n<h4><strong>Conti<\/strong><\/h4>\n<p>Sophos has reported extensively on the prolific Conti RaaS operation. Researchers will continue to track the evolution of this high profile threat following the events of early March 2022, when Conti\u2019s stance on the <a href=\"https:\/\/news.sophos.com\/en-us\/2022\/02\/22\/cyberthreats-during-russian-ukrainian-tensions-what-can-we-learn-from-history-to-be-prepared\/\">Russia Ukraine war<\/a> led to a series of <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/conti-ransomware-source-code-leaked-by-ukrainian-researcher\/\">public leaks<\/a> of its <a href=\"https:\/\/nakedsecurity.sophos.com\/2021\/08\/06\/conti-ransomware-affiliate-goes-rogue-leaks-company-data\/\">attack playbook<\/a>, toolset, internal communications, source code and more.<\/p>\n<p>Sophos analysis and insight on Conti ransomware include:<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/02\/16\/what-to-expect-when-youve-been-hit-with-conti-ransomware\/\">What to expect when you\u2019ve been hit with Conti ransomware<\/a><\/p>\n<p>Feb. 16, 2021 \u2013 Part of a series designed to help IT administrators facing the impact of an attack involving a particular ransomware family<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/02\/16\/conti-ransomware-evasive-by-nature\/\">Conti ransomware: Evasive by nature<\/a><\/p>\n<p>Feb. 16, 2021 \u2013 Sophos reports on how the attackers spreading Conti have switched gears to a completely fileless attack method<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/02\/16\/conti-ransomware-attack-day-by-day\/\">A Conti ransomware attack day-by-day<\/a><\/p>\n<p>Feb. 16, 2021 \u2013 Sophos reports on the unfolding of a Conti ransomware incident<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/09\/03\/conti-affiliates-use-proxyshell-exchange-exploit-in-ransomware-attacks\/\">Conti affiliates use ProxyShell Exchange exploit in ransomware attacks<\/a><\/p>\n<p>Sep. 3, 2021 \u2013 Sophos reports on an investigation into a Conti ransomware attack where the attackers used a <a href=\"https:\/\/news.sophos.com\/en-us\/2021\/08\/23\/proxyshell-vulnerabilities-in-microsoft-exchange-what-to-do\/\">ProxyShell<\/a> exploit<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2022\/02\/28\/conti-and-karma-actors-attack-healthcare-provider-at-same-time-through-proxyshell-exploits\/\">Conti and Karma actors attack healthcare provider at same time through ProxyShell exploits<\/a><\/p>\n<p>March 2, 2022 \u2013 Sophos reports on a rare, dual ransomware attack, where both Karma and Conti ransomware operators were in the network of a healthcare operator at the same time<\/p>\n<h4><strong>Cring<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/09\/21\/cring-ransomware-group-exploits-ancient-coldfusion-server\/\">Cring ransomware group exploits ancient ColdFusion server<\/a><\/p>\n<p>Sep. 21, 2021 \u2013 Sophos reports on an unknown threat actor exploiting a vulnerability in an 11-year-old installation of Adobe ColdFusion 9 and deploying rarely seen Cring ransomware<\/p>\n<h4><strong>DearCry<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/03\/15\/dearcry-ransomware-attacks-exploit-exchange-server-vulnerabilities\/\">DearCry ransomware attacks exploit Exchange server vulnerabilities<\/a><\/p>\n<p>March15, 2021 \u2013 Sophos reports on an unsophisticated, \u201cbeginner\u201d ransomware called DearCry, which mimics the notorious WannaCry ransomware<\/p>\n<h4><strong>Dharma<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2020\/08\/12\/color-by-numbers-inside-a-dharma-ransomware-as-a-service-attack\/\">Color by numbers: inside a Dharma ransomware-as-a-service attack<\/a><\/p>\n<p>Aug.12, 2020 \u2013 Sophos reports on the Dharma RaaS that targets smaller businesses and provides affiliates with detailed, step-by-step attack scripts<\/p>\n<h4><strong>DarkSide<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/05\/11\/a-defenders-view-inside-a-darkside-ransomware-attack\/\">A defender\u2019s view inside a DarkSide ransomware attack<\/a><\/p>\n<p>May 11, 2021 \u2013 A Sophos deep dive into the attack methods of the DarkSide ransomware group<\/p>\n<h4><strong>Egregor<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2020\/12\/08\/egregor-ransomware-mazes-heir-apparent\/\">Egregor ransomware: Maze\u2019s heir apparent<\/a><\/p>\n<p>Dec. 8, 2020 \u2013 Sophos reports on a new RaaS variant of Sekhmet ransomware that appears to have picked up where Maze left off<\/p>\n<h4><strong>Entropy<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2022\/02\/23\/dridex-bots-deliver-entropy-ransomware-in-recent-attacks\/\">Dridex bots deliver Entropy ransomware in recent attacks<\/a><\/p>\n<p>Feb. 23, 2022 \u2013 Sophos reports on how code used in Entropy ransomware bears a resemblance to code used in Dridex malware, suggesting a possible common origin<\/p>\n<h4><strong>Epsilon Red<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/05\/28\/epsilonred\/\">A new ransomware enters the fray: Epsilon Red<\/a><\/p>\n<p>May 28, 2021 \u2013 Sophos reports on a new, bare-bones ransomware that offloads most of its functionality to a series of PowerShell scripts<\/p>\n<h4><strong>GandCrab<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2019\/03\/05\/gandcrab-101-all-about-the-most-widely-distributed-ransomware-of-the-moment\/\">GandCrab 101: All about the most widely distributed ransomware of the moment<\/a><\/p>\n<p>March 5, 2019 \u2013 A deep dive into a ransomware that dominated the landscape in 2019<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2019\/05\/24\/gandcrab-spreading-via-directed-attacks-against-mysql-servers\/\">Directed attacks against MySQL servers deliver ransomware<\/a><\/p>\n<p>May 24, 2019 \u2013 Sophos reports on an unknown adversary attacking internet-facing Windows database servers with GandCrab ransomware<\/p>\n<h4><strong>Karma<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2022\/02\/28\/conti-and-karma-actors-attack-healthcare-provider-at-same-time-through-proxyshell-exploits\/\">Conti and Karma actors attack healthcare provider at same time through ProxyShell exploits<\/a><\/p>\n<p>March 2, 2022 \u2013 Sophos reports on a rare, dual ransomware attack, where both Karma and Conti ransomware operators were in the network of a healthcare operator at the same time<\/p>\n<h4><strong>LockBit<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2020\/04\/24\/lockbit-ransomware-borrows-tricks-to-keep-up-with-revil-and-maze\/\">LockBit ransomware borrows tricks to keep up with REvil and Maze<\/a><\/p>\n<p>April 24, 2020 \u2013 Sophos reports on how LockBit is implementing techniques and behaviors from other high profile ransomware groups<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2020\/10\/21\/lockbit-attackers-uses-automated-attack-tools-to-identify-tasty-targets\/\">LockBit uses automated attack tools to identify tasty targets<\/a><\/p>\n<p>Oct. 21, 2021 \u2013 Sophos reports on how the operators behind LockBit ransomware are using renamed copies of PowerShell and other automated tools to searched for systems with valuable data<\/p>\n<h4><strong>LockFile<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/08\/27\/lockfile-ransomwares-box-of-tricks-intermittent-encryption-and-evasion\/\">LockFile ransomware\u2019s box of tricks: intermittent encryption and evasion<\/a><\/p>\n<p>Aug. 27, 2021 \u2013 Sophos discovers a new ransomware family leveraging ProxyShell and using intermittent encryption of files to evade detection by anti-ransomware tools<\/p>\n<h4><strong>Matrix<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2019\/01\/30\/matrix-targeted-small-scale-canary-in-the-coal-mine-ransomware\/\">Matrix: Targeted, small scale, canary in the coalmine ransomware<\/a><\/p>\n<p>Jan. 30, 2019 \u2013 Sophos reports on how the unsophisticated Matrix ransomware succeeds by leveraging vulnerable remote desktops to breach networks and disrupt targets<\/p>\n<h4><strong>Maze<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2020\/05\/12\/maze-ransomware-1-year-counting\/\">Maze ransomware: extorting victims for 1 year and counting<\/a><\/p>\n<p>May 12, 2020 \u2013 Sophos reports on how the Maze ransomware operators were one of the first ransomware operations to use data theft as a way of coercing victims to pay the ransom demand<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2020\/09\/17\/maze-attackers-adopt-ragnar-locker-virtual-machine-technique\/\">Maze attackers adopt Ragnar Locker virtual machine technique<\/a><\/p>\n<p>Sep. 17, 2020 \u2013 Sophos reports on how Maze operators adopted a cumbersome ransomware <a href=\"https:\/\/news.sophos.com\/en-us\/2020\/05\/21\/ragnar-locker-ransomware-deploys-virtual-machine-to-dodge-security\/\">delivery technique<\/a> from Ragnar Locker after several failed attempts to deploy the ransomware<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2020\/09\/22\/mtr-casebook-blocking-a-15-million-maze-ransomware-attack\/\">MTR Casebook: Blocking a $15 million Maze ransomware attack<\/a><\/p>\n<p>Sep. 22, 2020 \u2013 A day-by-day account of the unfolding of a major Maze ransomware attack<\/p>\n<h4><strong>MegaCortex<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2019\/05\/03\/megacortex-ransomware-wants-to-be-the-one\/\">\u201cMegaCortex\u201d ransomware wants to be The One<\/a><\/p>\n<p>May 3, 2019 \u2013 Sophos reports on a new, sophisticated ransomware group leveraging both automated and manual components<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2019\/05\/10\/megacortex-deconstructed-mysteries-mount-as-analysis-continues\/\">MegaCortex, deconstructed: mysteries mount as analysis continues<\/a><\/p>\n<p>May 10, 2019 \u2013 A follow on research article including new insight on the ransomware group\u2019s tools, techniques, and misdirection tactics<\/p>\n<h4><strong>Memento<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/11\/18\/new-ransomware-actor-uses-password-protected-archives-to-bypass-encryption-protection\/\">New ransomware actor uses password protected archives to bypass encryption protection<\/a><\/p>\n<p>Nov. 18, 2021 \u2013 Sophos reports on an incident involving the new ransomware group, Memento, that failed to encrypt files so instead copied them into password-protected archives<\/p>\n<h4><strong>Midas<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2022\/01\/25\/windows-services-lay-the-groundwork-for-a-midas-ransomware-attack\/\">Windows services lay the groundwork for a Midas ransomware attack<\/a><\/p>\n<p>Jan. 25, 2022 \u2013 Sophos reports on a ransomware attack that made extensive use of vulnerable remote access services and PowerShell scripts<\/p>\n<h4><strong>Nefilim<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/01\/26\/nefilim-ransomware-attack-uses-ghost-credentials\/\">Nefilim Ransomware Attack Uses \u201cGhost\u201d Credentials<\/a><\/p>\n<p>Jan. 26, 202 \u2013 Sophos reports on an incident where the attackers gained access to the target using the account credentials of a deceased employee<\/p>\n<h4><strong>Netwalker<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2020\/05\/27\/netwalker-ransomware-tools-give-insight-into-threat-actor\/\">Netwalker ransomware tools give insight into threat actor<\/a><\/p>\n<p>May 27, 2020 \u2013 Sophos details the tactics, techniques, and procedures (TTPs) used by Netwalker after discovering a trove of malware and related files<\/p>\n<h4><strong>ProLock<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2020\/07\/27\/prolock-ransomware-gives-you-the-first-8-kilobytes-of-decryption-for-free\/\">ProLock ransomware gives you the first 8 kilobytes of decryption for free<\/a><\/p>\n<p>July 27, 2020 \u2013 Sophos reports on the attack chain and TTPs of this new ransomware<\/p>\n<h4><strong>Python<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/10\/05\/python-ransomware-script-targets-esxi-server-for-encryption\/\">Python ransomware script targets ESXi server for encryption<\/a><\/p>\n<p>Oct. 5, 2021 \u2013 Sophos reports one of the fastest ransomware attacks it has seen, where a Python script on the target\u2019s virtual machine hypervisor encrypted all virtual disks<\/p>\n<h4><strong>RagnarLocker<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2020\/05\/21\/ragnar-locker-ransomware-deploys-virtual-machine-to-dodge-security\/\">Ragnar Locker ransomware deploys virtual machine to dodge security<\/a><\/p>\n<p>May 21, 2020 \u2013 Sophos reports on an incident where the attackers deployed a full virtual machine on each targeted device to hide the ransomware from view<\/p>\n<h4><strong>Ragnarok<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2020\/05\/21\/asnarok2\/\">Asnar\u00f6k attackers twice modified attack midstream<\/a><\/p>\n<p>May 21, 2021 \u2013 Sophos reports on how Asnarok attackers try to deploy Ragnarok ransomware through an unpatched firewall<\/p>\n<h4><strong>REvil<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/06\/11\/relentless-revil-revealed\/\">Relentless REvil, revealed: RaaS as variable as the criminals who use it<\/a><\/p>\n<p>June 11, 2021 \u2013 Sophos details the different TTPs seen among the affiliate customers of the REvil RaaS<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/06\/30\/what-to-expect-when-youve-been-hit-with-revil-ransomware\/\">What to expect when you\u2019ve been hit with REvil ransomware<\/a><\/p>\n<p>June 30, 2021 \u2013 Part of a series designed to help IT administrators facing the impact of an attack involving a particular ransomware family<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/07\/04\/independence-day-revil-uses-supply-chain-exploit-to-attack-hundreds-of-businesses\/\">Independence Day: REvil uses supply chain exploit to attack hundreds of businesses<\/a><\/p>\n<p>July 4, 2021 \u2013 Sophos details the crypto-extortion attack launched by a REvil affiliate using a malicious update to exploit Kaseya\u2019s VSA remote management service<\/p>\n<h4><strong>RobbinHood<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2020\/02\/06\/living-off-another-land-ransomware-borrows-vulnerable-driver-to-remove-security-software\/\">Living off another land: Ransomware borrows vulnerable driver to remove security software<\/a><\/p>\n<p>Feb. 6, 2020 \u2013 Sophos reports on attacks where attackers deployed a legitimate, digitally signed hardware driver to delete security products from targeted computers before deploying RobbinHood ransomware<\/p>\n<h4><strong>Ryuk<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2020\/10\/14\/inside-a-new-ryuk-ransomware-attack\/\">They\u2019re back: inside a new Ryuk ransomware attack<\/a><\/p>\n<p>Oct. 14, 2020 \u2013 Sophos reports on the return of Ryuk after a period of quiet, with evolved tools for compromise and ransomware deployment<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/05\/06\/mtr-in-real-time-pirates-pave-way-for-ryuk-ransomware\/\">MTR in Real Time: Pirates pave way for Ryuk ransomware<\/a><\/p>\n<p>May 6, 2021 \u2013 Sophos reports on an incident where downloading a pirate software program led attackers to breach the network of a research institute and deploy Ryuk ransomware<\/p>\n<h4><strong>SamSam<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2018\/07\/31\/sophoslabs-releases-samsam-ransomware-report\/\">Sophos releases SamSam ransomware report<\/a><\/p>\n<p>July 31, 2018 \u2013 Sophos releases a deep dive into SamSam ransomware<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2018\/11\/29\/how-a-samsam-like-attack-happens-and-what-you-can-do-about-it\/\">How a SamSam-like attack happens, and what you can do about it<\/a><\/p>\n<p>Nov. 29, 2018 \u2013 Sophos details a typical SamSam ransomware attack and how to defend against it<\/p>\n<h4><strong>Snatch<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2019\/12\/09\/snatch-ransomware-reboots-pcs-into-safe-mode-to-bypass-protection\/\">Snatch ransomware reboots PCs into Safe Mode to bypass protection<\/a><\/p>\n<p>Dec. 9, 2019 \u2013 Sophos reports on a novel hybrid data theft-ransomware threat that disables security protections by rebooting Windows machines mid-attack<\/p>\n<h4><strong>WannaCry<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2019\/09\/18\/the-wannacry-hangover\/\">The WannaCry hangover<\/a><\/p>\n<p>Sep. 16, 2019 &#8211; Sophos reports how, more than two years on, modified WannaCry variants still cause headaches for IT admins and security analysts<\/p>\n<h4><strong>WastedLocker<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2020\/08\/04\/wastedlocker-techniques-point-to-a-familiar-heritage\/\">WastedLocker\u2019s techniques point to a familiar heritage<\/a><\/p>\n<p>Aug. 4, 2020 \u2013 Sophos reports on how WastedLocker evades detection by performing most operations in memory, and shares several characteristics with the Bitpaymer ransomware family<\/p>\n<h3><strong>Additional Assets<\/strong><\/h3>\n<h4><strong>Collective Reports and Analyses<\/strong><\/h4>\n<p><a href=\"https:\/\/www.sophos.com\/en-us\/medialibrary\/PDFs\/technical-papers\/sophoslabs-ransomware-behavior-report.pdf\">How ransomware attacks: What defenders should know about the most prevalent and persistent ransomware families<\/a><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/05\/18\/the-active-adversary-playbook-2021\/\">The Active Adversary Playbook 2021<\/a><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2018\/11\/14\/threat-report-2019\/\">The Sophos 2019 Threat Report<\/a><\/p>\n<p><a href=\"https:\/\/www.sophos.com\/en-us\/medialibrary\/pdfs\/technical-papers\/sophoslabs-uncut-2020-threat-report.pdf\">The Sophos 2020 Threat Report<\/a><\/p>\n<p><a href=\"https:\/\/www.sophos.com\/en-us\/medialibrary\/pdfs\/technical-papers\/sophos-2021-threat-report.pdf\">The Sophos 2021 Threat Report<\/a><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/11\/09\/2022-threat-report\/\">The Sophos 2022 Threat Report<\/a><\/p>\n<h4><strong>Insight and Advisory Articles<\/strong><\/h4>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2019\/11\/14\/how-the-most-damaging-ransomware-evades-it-security\/\">How the most damaging ransomware evades IT security<\/a><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2020\/08\/04\/the-realities-of-ransomware-five-signs-youre-about-to-be-attacked\/\">The realities of ransomware: Five signs you\u2019re about to be attacked<\/a><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2020\/08\/04\/the-realities-of-ransomware-extortion-goes-social-in-2020\/\">The realities of ransomware: Extortion goes social in 2020<\/a><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2020\/08\/04\/the-realities-of-ransomware-why-its-not-just-a-passing-fad\/\">The realities of ransomware: Why it\u2019s not just a passing fad<\/a><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2020\/08\/04\/the-realities-of-ransomware-a-victims-eye-view-of-an-attack\/\">The realities of ransomware: A victim\u2019s eye view of an attack<\/a><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2020\/08\/04\/the-realities-of-ransomware-the-evasion-arms-race\/\">The realities of ransomware: The evasion arms race<\/a><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/11\/09\/winners-and-losers-in-the-ransomware-turf-wars\/\">Winners and losers in the ransomware turf wars<\/a><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/10\/28\/the-top-10-ways-ransomware-operators-ramp-up-the-pressure-to-pay\/\">The top 10 ways ransomware operators ramp up the pressure to pay<\/a><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/08\/11\/ransomware-mishaps-adversaries-have-their-off-days-too\/\">Ransomware mishaps: Adversaries have their off days too<\/a><\/p>\n<p>&nbsp;<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2022\/03\/17\/the-ransomware-threat-intelligence-center\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/Sophos-News-banner-4-march-1200x628-1.png\"\/><\/p>\n<p><strong>Credit to Author: Tilly Travers| Date: Thu, 17 Mar 2022 09:13:50 +0000<\/strong><\/p>\n<p>A collection of Sophos threat research articles and security operations reports related to new or prevalent ransomware groups  from 2018 to the present. The content will be updated as new research is published<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[25396,25397,25398,25399,25400,25401,24646,25141,25402,24610,25403,21783,25404,17830,25405,129,17363,25154,24616,25406,23826,25407,7204,25408,25409,18143,25410,25411,3765,22297,21938,19317,17453,24552,23661,23362,12252,25412],"class_list":["post-18522","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-active-adversary","tag-astrolocker","tag-atom-silo","tag-avaddon","tag-avos-locker","tag-black-kingdom","tag-blackmatter","tag-conti","tag-cring","tag-darkside","tag-dearcry","tag-dharma","tag-egregor","tag-entropy","tag-epsilon-red","tag-featured","tag-gandcrab","tag-karma","tag-lockbit","tag-lockfile","tag-maze","tag-memento","tag-midas","tag-nefilim","tag-netwalker","tag-python","tag-ragnar-locker","tag-ragnarok","tag-ransomware","tag-revil","tag-robbinhood","tag-ryuk","tag-samsam","tag-security-operations","tag-snatch","tag-sophos-threat-report","tag-wannacry","tag-wastedlocker"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18522","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18522"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18522\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18522"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18522"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}