Security Market Segment LS
Wednesday, 13 November 2019 09:49

Aust firm offering ransomware 'recovery' at second domain as well Featured

By
Aust firm offering ransomware 'recovery' at second domain as well Pixabay

Australian firm Fast Data Recovery, which has been claiming to be able to decrypt files encrypted by the Windows Dharma ransomware, is offering its services from a second site, under the domain ransomware-recovery.com.au.

Brett Callow, a researcher from the security outfit Emsisoft, who informed iTWire about the fact that the company was offering to decrypt these files — which nobody else has been able to given the strength of encryption used — said the company's Facebook page indicated that Fast Data was the sister company of a computer repair business called PC Link Professionals.

It was Callow who focused attention on Fast Data Recovery, having sent the company a file that had been encrypted by Dharma and obtained quotes from the company which claimed that it would be able to decrypt the file in question.

As iTWire reported on Tuesday, there is no way that such files can be decrypted unless one has access to the private key with which they have been encrypted.

Commenting on the incident, Matt Bennett, vice-president of Asia Pacific and Japan for security firm Carbon Black, said: "From what we can see, the Dharma ransomware appears to have been well written. The encryption appears to be using public/private key encryption, which means without the private key it would be almost impossible to decrypt, unless you have discovered a vulnerability in the encryption routine.

"These kinds of data recovery businesses are becoming more and more common. It’s increasingly difficult for security industry professionals to know exactly how these businesses recover data but some theories are they:

  • "simply pay the ransom and keep the difference. This is most likely done after they negotiate a better rate/price;
  • "when possible, use free decryption tools but still charge the customer the fee;
  • "may have a way of decrypting files (possibly via contacts in the 'dark web'); and/or
  • "try to decrypt and when it fails return the fee minus any 'assessment/evaluation' fees."

Bennett pointed out that the Dharma ransomware used Windows Remote Desktop Protocol for “remoting” into systems and infecting them.

"To avoid infection, businesses should ensure that the RDP is never exposed to the Internet," he said. "However, if RDP is needed, you can take the necessary precautions to minimise an attack. This includes ensuring that your Network Level Authentication is enabled, making sure that you have a username and complex password to login, ideally use Multi-Factor Authentication for RDP and making sure that your system is patched.

"Ransomware attacks are becoming all too commonplace, but there are some good cyber hygiene practices to adopt including taking regular backups of your important files, storing them on a portable USB drive, disconnecting that USB drive when you’re not actively backing up files and consider using cloud based file storage solutions that offer automated backups/rollback of your files.”

Read 3187 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here

SONICWALL 2022 CYBER THREAT REPORT

The past year has seen a meteoric rise in ransomware incidents worldwide.

Over the past 12 months, SonicWall Capture Labs threat researchers have diligently tracked the meteoric rise in cyberattacks, as well as trends and activity across all threat vectors, including:

Ransomware
Cryptojacking
Encrypted threats
IoT malware
Zero-day attacks and more

These exclusive findings are now available via the 2022 SonicWall Cyber Threat Report, which ensures SMBs, government agencies, enterprises and other organizations have the actionable threat intelligence needed to combat the rising tide of cybercrime.

Click the button below to get the report.

GET REPORT!

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

BACK TO HOME PAGE
Sam Varghese

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

Share News tips for the iTWire Journalists? Your tip will be anonymous

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments