Having highlighted the goals and rules for the research, Zoz demonstrates HDD
destruction attempts via a couple of thermal methods, including oxygen
So method number one, the good old plasma cutter (watch video below).
Starting off keeping things simple. I had used plasma cutters many times and
I expected it could make much more of a mess with a hard disk.
Using plasma cutter to destroy a hard drive
But as you can see, really nice, it completes in about 40 seconds. It’s
very easy to contain using, you could build an array of plasma cutting heads
that would match the disk. Looks pretty good so far. Oh, this drive is
powered up and spinning – I wanted to see if it would keep spinning, and so
just one insertion point would be enough to destroy the top platter. It will
start to leak out a little bit down the bottom, which will let you know that
it’s done. Ve... (more)
Initially, we came across ransomware which exploited the entire system and
just restricted you from interacting with your own device, later on requiring
you to pay dollars if you want to go back and use your computer.
And then it started becoming obsolete because an end-user. People were asking
themselves: “That is my computer, would I pay $100 for it? If I don't
really have data, I’d better format my PC and start all over again.” So,
that strategy – locking access to computers, started becoming obsolete.
What did the bad guys do? They realized that the previous strategy was onl... (more)
It's been years since it became obvious that crypto isn't necessarily usable
for benign purposes only. Back in the day, a variety of data encryption
techniques were contrived to protect sensitive communication against MITM
(man-in-the-middle) attacks and similar interception attempts. The creators
of file-encrypting ransomware, however, have ventured to add a malicious
component to the mix, using both symmetric and asymmetric algorithms to lock
their victims' data and hold it for ransom.
The most common cryptosystems leveraged in these campaigns are RSA and AES.
Although these ... (more)
Although the publisher of TeamViewer takes security seriously and ensures
encrypted communication between endpoints and servers through RSA-2048 and
AES-256 ciphers, there have been incidents where perpetrators successfully
used the app in large-scale hoaxes. It turns out that the Internet scoundrels
don't necessarily have to get around the strong crypto defenses to deploy
their devious stratagems.
SURPRISE RANSOMWARE INCIDENT
Ransomware, a real scourge of the present-day Internet, has been reportedly
circulating over unauthorized TeamViewer sessions. This issue recently got
This is a comprehensive report on ransomware-related events covering a time
frame of May – December 2016. The incidents herein are visually broken down
into categories, including new ransomware, updates of existing strains,
decryptors released, and other noteworthy news. Security researchers and
users interested in the ransomware subject can now use this all-in-one
knowledgebase instead of having to collect data from multiple different
New ransomware released
Old ransomware updated
Other important ransomware related events
THE ENIGMA RANSOMWARE SU... (more)