{"id":1964,"date":"2022-03-30T08:54:30","date_gmt":"2022-03-30T08:54:30","guid":{"rendered":"https:\/\/fortgale.com\/threats\/?page_id=1964"},"modified":"2024-01-03T09:17:26","modified_gmt":"2024-01-03T09:17:26","slug":"ransomware","status":"publish","type":"page","link":"https:\/\/fortgale.com\/threats\/ransomware\/","title":{"rendered":"Ransomware"},"content":{"rendered":"<div data-colibri-id=\"1964-c1\" class=\"style-1091 style-local-1964-c1 position-relative\">\n  \n  <div data-colibri-component=\"section\" data-colibri-id=\"1964-c2\" id=\"groups\" class=\"h-section h-section-global-spacing d-flex align-items-lg-center align-items-md-center align-items-center style-1562 style-local-1964-c2 position-relative\">\n    \n    \n    <div class=\"h-section-grid-container h-section-boxed-container\">\n      \n      <div data-colibri-id=\"1964-c3\" class=\"h-row-container gutters-row-lg-1 gutters-row-md-1 gutters-row-0 gutters-row-v-lg-1 gutters-row-v-md-1 gutters-row-v-1 style-1541 style-local-1964-c3 position-relative\">\n        \n        <div class=\"h-row justify-content-lg-start justify-content-md-start justify-content-start align-items-lg-stretch align-items-md-stretch align-items-stretch gutters-col-lg-1 gutters-col-md-1 gutters-col-0 gutters-col-v-lg-1 gutters-col-v-md-1 gutters-col-v-1\">\n          \n          <div class=\"h-column h-column-container d-flex h-col-lg-4 h-col-md-4 h-col-12 style-1564-outer style-local-1964-c4-outer\">\n            <div data-colibri-id=\"1964-c4\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-0 h-px-md-0 h-px-0 v-inner-lg-0 v-inner-md-0 v-inner-0 style-1564 style-local-1964-c4 position-relative\">\n              \n              \n              <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n                \n                <div data-colibri-id=\"1964-c5\" class=\"h-global-transition-all h-heading style-328 style-local-1964-c5 position-relative h-element\">\n                  \n                  <div class=\"h-heading__outer style-328 style-local-1964-c5\">\n                    \n                    \n                    <h3 class=\"\">Lockbit<\/h3>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"1964-c6\" class=\"h-lead h-text h-text-component style-1108 style-local-1964-c6 position-relative h-element\">\n                  \n                  \n                  <div class=\"\">\n                    <p><span style=\"font-weight: 700\">Alias: <\/span><span style=\"font-weight: 700\">BITWISE SPIDER<\/span><\/p>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"1964-c7\" class=\"h-text h-text-component style-329 style-local-1964-c7 position-relative h-element\">\n                  \n                  \n                  <div class=\"\">\n                    <p>The first activities attributed to Lockbit were recorded in September 2019, Ransomware became popular in 2021 thanks to the development of the <strong>LockBit 2.0 RaaS.<\/strong><\/p>\n                    <p>The Ransomware was used in attacks on more than 2,000 companies worldwide.<\/p>\n                    <p>Lockbit uses the double extortion technique, in addition to that for data they require an additional ransom for non-disclosure of sensitive data.<\/p>\n                    <p>LockBit affiliates (or Operators) often perform\n                      <u>Brute-Force activities to gain RDP or VPN access to Companies, often purchase credentials in criminal marketplaces or use Phishing techniques to compromise victims&#8217; accounts.<\/u>\n                    <\/p>\n                    <p>This ransomware uses AES algorithm in CBC mode to encrypt victims&#8217; data.<\/p>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"1964-c8\" class=\"h-global-transition-all h-heading style-1574 style-local-1964-c8 position-relative h-element\">\n                  \n                  <div class=\"h-heading__outer style-1574 style-local-1964-c8\">\n                    \n                    \n                    <h6 class=\"\">Sources:<\/h6>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"1964-c9\" class=\"h-x-container style-1113 style-local-1964-c9 position-relative h-element\">\n                  \n                  <div class=\"h-x-container-inner style-dynamic-1964-c9-group style-1113-spacing style-local-1964-c9-spacing\"><span class=\"h-button__outer style-1115-outer style-local-1964-c10-outer d-inline-flex h-element\"><a href=\"https:\/\/fortgale.com\/news\/?s=ransomware%20lockbit\" data-colibri-id=\"1964-c10\" class=\"d-flex w-100 align-items-center h-button justify-content-lg-center justify-content-md-center justify-content-center style-1115 style-local-1964-c10 position-relative\"><!--&gt;--> <span> Fortgale Analysis<\/span><\/a>\n                    <\/span><span class=\"h-button__outer style-1576-outer style-local-1964-c11-outer d-inline-flex h-element\"><a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.lockbit\" target=\"_blank\" data-colibri-id=\"1964-c11\" class=\"d-flex w-100 align-items-center h-button justify-content-lg-center justify-content-md-center justify-content-center style-1576 style-local-1964-c11 position-relative\" rel=\"noopener\"><!--&gt;--> <span>Malpedia<\/span><\/a>\n                    <\/span>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n          <div class=\"h-column h-column-container d-flex h-col-lg-4 h-col-md-4 h-col-12 style-1565-outer style-local-1964-c12-outer\">\n            <div data-colibri-id=\"1964-c12\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-0 h-px-md-0 h-px-0 v-inner-lg-0 v-inner-md-0 v-inner-0 style-1565 style-local-1964-c12 position-relative\">\n              \n              \n              <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n                \n                <div data-colibri-id=\"1964-c13\" class=\"h-global-transition-all h-heading style-328 style-local-1964-c13 position-relative h-element\">\n                  \n                  <div class=\"h-heading__outer style-328 style-local-1964-c13\">\n                    \n                    \n                    <h3 class=\"\">Conti<\/h3>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"1964-c14\" class=\"h-lead h-text h-text-component style-1108 style-local-1964-c14 position-relative h-element\">\n                  \n                  \n                  <div class=\"\">\n                    <p><strong style=\"font-weight: 700\">Alias: &#8211;<\/strong><\/p>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"1964-c15\" class=\"h-text h-text-component style-329 style-local-1964-c15 position-relative h-element\">\n                  \n                  \n                  <div class=\"\">\n                    <p>The Conti criminal group develops and maintains the RaaS (Ransomware-as-a-Service) service, the first samples of which date back to 2019.<\/p>\n                    <p>This is a highly efficient, multi-threaded ransomware used in targeted operations against large businesses. The name derives from the &#8220;.CONTI&#8221; format in which files encrypted via AES-256 and RSA-4096 are saved.<\/p>\n                    <p>Initial access to infrastructure is often achieved through malware such as <strong>EMOTET, TRICKBOT<\/strong> and <strong>COBALT STRIKE<\/strong>, or through RDP and VPN credential theft.<\/p>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"1964-c16\" class=\"h-global-transition-all h-heading style-1574 style-local-1964-c16 position-relative h-element\">\n                  \n                  <div class=\"h-heading__outer style-1574 style-local-1964-c16\">\n                    \n                    \n                    <h6 class=\"\">Sources:<\/h6>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"1964-c17\" class=\"h-x-container style-1577 style-local-1964-c17 position-relative h-element\">\n                  \n                  <div class=\"h-x-container-inner style-dynamic-1964-c17-group style-1577-spacing style-local-1964-c17-spacing\"><span class=\"h-button__outer style-1115-outer style-local-1964-c18-outer d-inline-flex h-element\"><a href=\"https:\/\/fortgale.com\/news\/?s=Ransomware%20conti\" data-colibri-id=\"1964-c18\" class=\"d-flex w-100 align-items-center h-button justify-content-lg-center justify-content-md-center justify-content-center style-1115 style-local-1964-c18 position-relative\"><!--&gt;--> <span>Fortgale Analysis<\/span><\/a>\n                    <\/span><span class=\"h-button__outer style-1576-outer style-local-1964-c19-outer d-inline-flex h-element\"><a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.conti\" data-colibri-id=\"1964-c19\" class=\"d-flex w-100 align-items-center h-button justify-content-lg-center justify-content-md-center justify-content-center style-1576 style-local-1964-c19 position-relative\"><!--&gt;--> <span>Malpedia<\/span><\/a>\n                    <\/span>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n          <div class=\"h-column h-column-container d-flex h-col-lg-4 h-col-md-4 h-col-12 style-1570-outer style-local-1964-c20-outer\">\n            <div data-colibri-id=\"1964-c20\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-0 h-px-md-0 h-px-0 v-inner-lg-0 v-inner-md-0 v-inner-0 style-1570 style-local-1964-c20 position-relative\">\n              \n              \n              <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n                \n                <div data-colibri-id=\"1964-c21\" class=\"h-global-transition-all h-heading style-328 style-local-1964-c21 position-relative h-element\">\n                  \n                  <div class=\"h-heading__outer style-328 style-local-1964-c21\">\n                    \n                    \n                    <h3 class=\"\">Hive<\/h3>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"1964-c22\" class=\"h-lead h-text h-text-component style-1108 style-local-1964-c22 position-relative h-element\">\n                  \n                  \n                  <div class=\"\">\n                    <p><strong style=\"font-weight: 700\">Alias: VICE SPIDER<br><\/strong><\/p>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"1964-c23\" class=\"h-text h-text-component style-329 style-local-1964-c23 position-relative h-element\">\n                  \n                  \n                  <div class=\"\">\n                    <p>Hive is the name of the group that develops and maintains the Hive <strong>RaaS <\/strong>service, born in 2021. The affiliates, to compromise the victim infrastructures, exploit various techniques based on the initial compromise via\n                      Phishing and Malware.<\/p>\n                    <p>Hive uses the <strong>double extortion technique<\/strong>, in addition to the ransom for the data, it requests an additional ransom for the non-disclosure of sensitive data.<\/p>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"1964-c24\" class=\"h-global-transition-all h-heading style-1574 style-local-1964-c24 position-relative h-element\">\n                  \n                  <div class=\"h-heading__outer style-1574 style-local-1964-c24\">\n                    \n                    \n                    <h6 class=\"\">Sources:<\/h6>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"1964-c25\" class=\"h-x-container style-1580 style-local-1964-c25 position-relative h-element\">\n                  \n                  <div class=\"h-x-container-inner style-dynamic-1964-c25-group style-1580-spacing style-local-1964-c25-spacing\"><span class=\"h-button__outer style-1115-outer style-local-1964-c26-outer d-inline-flex h-element\"><a href=\"https:\/\/fortgale.com\/news\/?s=ransomware hive\" data-colibri-id=\"1964-c26\" class=\"d-flex w-100 align-items-center h-button justify-content-lg-center justify-content-md-center justify-content-center style-1115 style-local-1964-c26 position-relative\"><!--&gt;--> <span>Fortgale Analysis<\/span><\/a>\n                    <\/span><span class=\"h-button__outer style-1576-outer style-local-1964-c27-outer d-inline-flex h-element\"><a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.hive\" data-colibri-id=\"1964-c27\" class=\"d-flex w-100 align-items-center h-button justify-content-lg-center justify-content-md-center justify-content-center style-1576 style-local-1964-c27 position-relative\"><!--&gt;--> <span>Malpedia<\/span><\/a>\n                    <\/span>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Lockbit Alias: BITWISE SPIDER The first activities attributed to Lockbit were recorded in September 2019, Ransomware became popular in 2021 thanks to the development of the LockBit 2.0 RaaS. The Ransomware was used in attacks on more than 2,000 companies worldwide. Lockbit uses the double extortion technique, in addition to that for data they require [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/full-width-page.php","meta":{"footnotes":""},"class_list":["post-1964","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Fortgale and Cyber Threats - Ransomware<\/title>\n<meta name=\"description\" content=\"Informazioni tecniche relative a Malware, Ransomware, strumenti offensivi e tecniche di compromissione.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fortgale and Cyber Threats - Ransomware\" \/>\n<meta property=\"og:description\" content=\"Informazioni tecniche relative a Malware, Ransomware, strumenti offensivi e tecniche di compromissione.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fortgale.com\/threats\/ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"Fortgale and Cyber Threats\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-03T09:17:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fortgale.com\/threats\/wp-content\/uploads\/sites\/3\/2022\/03\/Fortgale_Threats.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/ransomware\\\/\",\"url\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/ransomware\\\/\",\"name\":\"Fortgale and Cyber Threats - Ransomware\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/#website\"},\"datePublished\":\"2022-03-30T08:54:30+00:00\",\"dateModified\":\"2024-01-03T09:17:26+00:00\",\"description\":\"Informazioni tecniche relative a Malware, Ransomware, strumenti offensivi e tecniche di compromissione.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/ransomware\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fortgale.com\\\/threats\\\/ransomware\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/ransomware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/#website\",\"url\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/\",\"name\":\"Fortgale and Cyber Threats\",\"description\":\"Fortgale Threats, ATT&amp;CK, Malware...\",\"publisher\":{\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/#organization\",\"name\":\"Fortgale\",\"url\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2022\\\/04\\\/logo_blu.png\",\"contentUrl\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2022\\\/04\\\/logo_blu.png\",\"width\":558,\"height\":125,\"caption\":\"Fortgale\"},\"image\":{\"@id\":\"https:\\\/\\\/fortgale.com\\\/threats\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Fortgale and Cyber Threats - Ransomware","description":"Informazioni tecniche relative a Malware, Ransomware, strumenti offensivi e tecniche di compromissione.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"it_IT","og_type":"article","og_title":"Fortgale and Cyber Threats - Ransomware","og_description":"Informazioni tecniche relative a Malware, Ransomware, strumenti offensivi e tecniche di compromissione.","og_url":"https:\/\/fortgale.com\/threats\/ransomware\/","og_site_name":"Fortgale and Cyber Threats","article_modified_time":"2024-01-03T09:17:26+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/fortgale.com\/threats\/wp-content\/uploads\/sites\/3\/2022\/03\/Fortgale_Threats.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Tempo di lettura stimato":"3 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/fortgale.com\/threats\/ransomware\/","url":"https:\/\/fortgale.com\/threats\/ransomware\/","name":"Fortgale and Cyber Threats - Ransomware","isPartOf":{"@id":"https:\/\/fortgale.com\/threats\/#website"},"datePublished":"2022-03-30T08:54:30+00:00","dateModified":"2024-01-03T09:17:26+00:00","description":"Informazioni tecniche relative a Malware, Ransomware, strumenti offensivi e tecniche di compromissione.","breadcrumb":{"@id":"https:\/\/fortgale.com\/threats\/ransomware\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fortgale.com\/threats\/ransomware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/fortgale.com\/threats\/ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/fortgale.com\/threats\/"},{"@type":"ListItem","position":2,"name":"Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/fortgale.com\/threats\/#website","url":"https:\/\/fortgale.com\/threats\/","name":"Fortgale and Cyber Threats","description":"Fortgale Threats, ATT&amp;CK, Malware...","publisher":{"@id":"https:\/\/fortgale.com\/threats\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fortgale.com\/threats\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/fortgale.com\/threats\/#organization","name":"Fortgale","url":"https:\/\/fortgale.com\/threats\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/fortgale.com\/threats\/#\/schema\/logo\/image\/","url":"https:\/\/fortgale.com\/threats\/wp-content\/uploads\/sites\/3\/2022\/04\/logo_blu.png","contentUrl":"https:\/\/fortgale.com\/threats\/wp-content\/uploads\/sites\/3\/2022\/04\/logo_blu.png","width":558,"height":125,"caption":"Fortgale"},"image":{"@id":"https:\/\/fortgale.com\/threats\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/fortgale.com\/threats\/wp-json\/wp\/v2\/pages\/1964","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fortgale.com\/threats\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fortgale.com\/threats\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fortgale.com\/threats\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/fortgale.com\/threats\/wp-json\/wp\/v2\/comments?post=1964"}],"version-history":[{"count":20,"href":"https:\/\/fortgale.com\/threats\/wp-json\/wp\/v2\/pages\/1964\/revisions"}],"predecessor-version":[{"id":3273,"href":"https:\/\/fortgale.com\/threats\/wp-json\/wp\/v2\/pages\/1964\/revisions\/3273"}],"wp:attachment":[{"href":"https:\/\/fortgale.com\/threats\/wp-json\/wp\/v2\/media?parent=1964"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}