Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Free BitLocker-based decryptor released for ShrinkLocker ransomware victims
Global Security

Free BitLocker-based decryptor released for ShrinkLocker ransomware victims

AdminBy AdminNovember 13, 2024No Comments4 Mins Read
ShrinkLocker Ransomware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


ShrinkLocker ransomware

Romanian cybersecurity firm Bitdefender has released a free decryptor to help victims recover data encrypted by the ShrinkLocker ransomware.

The decoder is the result of a comprehensive analysis of ShrinkLocker’s inner workings, allowing researchers to discover “a specific window of opportunity to recover data immediately after the protectors are removed from BitLocker-encrypted drives.”

ShrinkLocker was first documented in May 2024 Kaspersky discovered that the malware was using Microsoft’s proprietary BitLocker utility to encrypt files as part of ransomware attacks targeting Mexico, Indonesia and Jordan.

Bitdefender, which investigated the ShrinkLocker incident targeting an unnamed healthcare company in the Middle East, said the attack likely came from a machine owned by a contractor, underscoring once again that threat actors are becoming more abuse of trust to penetrate the supply chain.

Cyber ​​security

In the next step, the threat actor moved sideways to the Active Directory domain controller using legitimate credentials for the compromised account, then created two scheduled tasks to activate the ransomware process.

While the first task executed a Visual Basic script (“Check.vbs”) that copied the ransomware to each domain-joined machine, the second task, scheduled two days later, executed the locally deployed ransomware (“Audit. vbs”) .

According to Bitdefender, the attack successfully encrypted systems running Windows 10, Windows 11, Windows Server 2016 and Windows Server 2019. However, the ShrinkLocker variant used is believed to be a modified version of the original version.

Described as simple but effective, the ransomware is notable for being written in VBScript, a scripting language that Microsoft says is outdated starting from the second half of 2024. Also, instead of implementing its own encryption algorithm, the malware uses BitLocker to achieve its goals.

The script is designed to gather system configuration and operating system information, then it tries to check if BitLocker is already installed on the Windows Server machine, and if not, installs it using a PowerShell command, then performs a “forced reboot” using Win32 exception.

ShrinkLocker ransomware

But Bitdefender said it found a bug that causes this request to fail with a “Privilege Denied” error, causing VBScript to get stuck in an infinite loop due to a failed reboot attempt.

“Even if the server is manually rebooted (for example by an unsuspecting administrator), the script has no mechanism to resume its execution after a reboot, which means the attack can be interrupted or prevented,” Martin Zugek, Director of Technical Solutions, Bitdefender. , said.

The ransomware is designed to generate a random password derived from system information such as network traffic, system memory, and disk usage, using it to encrypt system drives.

The unique password is then uploaded to a server controlled by the attacker. After rebooting, the user is prompted for a password to unlock the encrypted drive. The BitLocker screen is also configured to display the threat actor’s contact email address to initiate payment in exchange for the password.

That’s not all. The script makes several modifications to the registry to restrict access to the system by disabling remote RDP connections and disabling password-based local logins. As part of its cleanup efforts, it also disables Windows Firewall rules and deletes audit files.

Cyber ​​security

Bitdefender also noted that the name ShrinkLocker is misleading, as the functionality of the same name is limited to older Windows systems and that it does not actually shrink partitions on modern operating systems.

“Using a combination of Group Policy Objects (GPOs) and scheduled tasks, it can encrypt multiple systems on a network in just 10 minutes per device,” Zugek noted. “As a result, a complete domain compromise can be achieved with very little effort.”

“Proactively monitoring certain Windows event logs can help organizations identify and respond to potential BitLocker attacks even at an early stage, such as when attackers are testing their encryption capabilities.”

“By configuring BitLocker to store recovery information in Active Directory Domain Services (AD DS) and enforcing a policy of ‘Do not enable BitLocker until recovery information is stored in AD DS for operating system drives,’ organizations can significantly reduce the risk of BitLocker-based attacks”.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.