Grafana fixes zero-day vulnerability after exploits spread over Twitter
Google disrupts massive Glupteba botnet, sues Russian operators
Emotet now drops Cobalt Strike, fast forwards ransomware attacks
New Cerber ransomware targets Confluence and GitLab servers
Emotet now drops Cobalt Strike, fast forwards ransomware attacks
Grafana fixes zero-day vulnerability after exploits spread over Twitter
AWS outage impacts Ring, Netflix, and Amazon deliveries
Alleged ransomware affiliate arrested for healthcare attacks
Qualys BrowserCheck
STOPDecrypter
AuroraDecrypter
FilesLockerDecrypter
AdwCleaner
ComboFix
RKill
Junkware Removal Tool
How to remove the PBlock+ adware browser extension
Remove the Toksearches.xyz Search Redirect
Remove the Smashapps.net Search Redirect
Remove the Smashappsearch.com Search Redirect
Remove Security Tool and SecurityTool (Uninstall Guide)
How to remove Antivirus 2009 (Uninstall Instructions)
How to Remove WinFixer / Virtumonde / Msevents / Trojan.vundo
How to remove Google Redirects or the TDSS, TDL3, or Alureon rootkit using TDSSKiller
Locky Ransomware Information, Help Guide, and FAQ
CryptoLocker Ransomware Information Guide and FAQ
CryptorBit and HowDecrypt Information Guide and FAQ
CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ
How to make the Start menu full screen in Windows 10
How to install the Microsoft Visual C++ 2015 Runtime
How to open an elevated PowerShell Admin prompt in Windows 10
How to Translate a Web Page in Google Chrome
How to start Windows in Safe Mode
How to remove a Trojan, Virus, Worm, or other Malware
How to show hidden files in Windows 7
How to see hidden files in Windows
eLearning
IT Certification Courses
Gear + Gadgets
Security

Image: Ivan Diaz
German security software company G DATA has released a vaccine that will block STOP Ransomware from encrypting victims’ files after infection.
“This tool does not prevent the infection itself. STOP ransomware will still place ransom notes and may change settings on the systems,” G DATA malware analysts Karsten Hahn and John Parol explained.
“But STOP ransomware will not encrypt files anymore if the system has the vaccine. Instead of a personal ID, the ransom notes will contain a string that files were protected by the vaccine.”
You can download the STOP Ransomware vaccine here, as a compiled .EXE or Python script.
This vaccine may cause your security software to believe your system is infected since it works by adding files the malware usually deploys on infected systems to trick the ransomware the device was already compromised.
While a decryptor was also released for STOP Ransomware in October 2019 by Emsisoft and Michael Gillespie to decrypt files encrypted by 148 variants for free, it no longer works with newer variants. Hence, G DATA’s vaccine is your best bet if you want protection against this ransomware strain.
However, since threat actors commonly bypass vaccines after they are released, this vaccine may stop working for future versions of this ransomware.
Therefore, after applying the vaccine, you should ensure that your important files are also backed up!
While other ransomware strains get the most media attention, STOP ransomware has constantly been behind the most significant slice of ID Ransomware submissions and support requests on BleepingComputer’s forums in recent years.
Out of thousands of ID Ransomware submissions per day during high ransomware activity, anywhere between 60 and 70 % are STOP ransomware submissions.
This is because this ransomware mainly targets home users through shady sites and adware bundles that push malicious software cracks or adware bundles disguised as free programs.
The latter usually install a wide range of unwanted software onto a user’s computer, and, more often than not, one of the programs installed is malware such as STOP Ransomware.
Cracks reported to have been used in STOP Ransomware delivery include KMSPico, Cubase, Photoshop, and antivirus software.
Besides using this deployment method, STOP is just your ordinary ransomware, which encrypts files, appends an extension, and drops a note asking for a ransom ranging from $500 to $1000. 
However, what makes it so successful is the massive amount of variants constantly being released to avoid detection.
Hackers target biomanufacturing with stealthy Tardigrade malware
Emotet now drops Cobalt Strike, fast forwards ransomware attacks
Alleged ransomware affiliate arrested for healthcare attacks
New Cerber ransomware targets Confluence and GitLab servers
Hundreds of SPAR stores shut down, switch to cash after cyberattack
Wow! That’s nice!

Anyway, come on people wake up! Get a grip! this Goddamn Ransomware needs serious attention to the public . it should be on the Top Most Wanted list of the FBI, Interpol, and other Agencies in order to arrest these spineless cowards .
No, you just need to secure your computer

I can run Windows XP-SP2 online without a single security update in a full admin account without ever having a single malware or ransomware problem

Why can’t “you” do that with a fully updated Windows 10 or 11 installation?

Why?

The problem is between the keyboard and chair
Fix that!
NP i’ll see what i can do but first you need to adjust your attitude as the way you talking to me will not gonna help fix that sh*t (calm down ok) .

Two things is either we have to keep ourselves quiet and wait for good news or we talk none-sense for nothing . other than that I don’t have time to chat with you . and that’s the bottom line because Mac_Jones said so !

PS: my keyboard and chair looks ok maybe yours is not mудак .
Not a member yet? Register Now
Russian hacking group uses new stealthy Ceeloader malware
Hundreds of SPAR stores shut down, switch to cash after cyberattack
To receive periodic updates and news from BleepingComputer, please use the form below.
AdwCleaner
Malwarebytes for Mac
Malwarebytes Anti-Malware
Farbar Recovery Scan Tool
Windows Repair (All In One)
Terms of Use Privacy PolicyEthics Statement
Copyright @ 2003 – 2021 Bleeping Computer® LLC – All Rights Reserved
Not a member yet? Register Now
Read our posting guidelinese to learn what content is prohibited.

source

You May Also Like

New Rowhammer technique bypasses existing DDR4 memory defenses

Windows 10 21H2 is released, here are the new featuresNew Rowhammer technique…

Winamp prepares a relaunch, new beta version almost ready

US regulators order banks to report cyberattacks within 36 hoursHackers deploy Linux…

Careful: 'Smart TV remote' Android app on Google Play is malware

HPE says hackers breached Aruba Central using stolen access keyFBI warns of…

Hackers deploy Linux malware, web skimmer on e-commerce servers

US indicts Iranian hackers for Proud Boys voter intimidation emailsWinamp prepares a…