Category: Não categorizado
Vice Society
Ransomware

Ransomware Vice Society

The Vice Society ransomware attacks led to an update to the Windows print spooler code. The port the group used for their attacks was known as “PrintNightmare” the Windows update aimed to close this port. This flaw was in the printing system, after failing to execute the Spooler the hackers could access the operating system which granted them the same

READ MORE →
Ransomware
Ransomware

Ransomware Conti

In May of this year, the FBI released an alert about the considerable increase in attacks carried out by the Conti Ransomware. They use the RaaS (Ransomware as a Service), which is a way of outsourcing the spread of this ransomware, amplifying the number of attacks exponentially. They are evolving this type of service, instead of paying just a commission

READ MORE →
PYSA
Ransomware

PYSA Ransomware Cyber ​​Attacks

The PYSA (Protect Your System Amigo) Ransomware or Mespinoza Ransomware has been operating effectively on the internet for a long time. He is famous for numerous attacks. So much so that the FBI has released a warning of the dangers of this ransomware. It has been in operation since December 2019 and remains active today. In order to pressure victims

READ MORE →
BlackMatter
Ransomware

Ransomware BlackMatter

After the successful attacks made by the Darkside ransomware on the Colonial Pipe pipeline and the REvil Sodinokibi ransomware on Kaseya, both have shut down. This caused a gap to be opened for new ransomware extensions to appear seeking a leading role in attacks and so-called Ransomware-as-a-Service (RaaS) which is the outsourcing of attacks. From this gap some ransomware emerged

READ MORE →
Ransomware
Ransomware

Ransomware LockBit 2.0

Digital Recovery through its many years of experience has developed unique technologies capable of recovering data encrypted by Ransomware, in many cases without paying the ransom and without the Ransomware decryption key.   Don’t be taken in by the supposed experts who, because of their lack of know-how, insist that data recovery is only possible with the help of hackers and

READ MORE →
Recuperar Ransomware Makop
Ransomware

Makop Ransomware

Makop ransomware has been expanding through its affiliate program, RaaS (Ransomware as a Service), a tactic that aims to seek partners to carry out attacks by only charging a commission on top of the ransom value. This tactic is intended to expand the attacks by bringing renown to the group. The main target of this group has been companies in

READ MORE →
Intercobros Ransomware
Ransomware

Ransomware Intercobros

The Intercobros Ransomware is a new group that has emerged, but has not presented anything new compared to all the other groups. Intercobros follows the same pattern of hacking, encrypting, extracting, and charging a ransom fee for the data. That is the primer of every ransomware group. But make no mistake, Intercobros ransomware is a real risk to any company or

READ MORE →
Ransomware Avos Linux
Ransomware

Ransomware Avos Linux

The Avos Linux ransomware is a new update of the Avos Locker ransomware, this new version targets the Linux operating system and specifically Vmware ESXi servers. There have already been numerous attacks recorded from this new variation of Avos Locker, one of the ransomware requested by the group has reached $1 million. The group is targeting large corporations with targeted attacks. Many

READ MORE →
Amazenamento de dados
Data Storage

The Real Size of a Yottabyte

After Edward Snowden made the accusation that the NSA (National Security Agency) of the USA was spying on companies all over the world, including Petrobras in Brazil, several reports from different places in the world, including Brazil, targeted the American agency. To understand better see this Fantástico report published on 15/09/2013. As shown in the above report, the United States

READ MORE →
Damaged disk

Severely Scratched Disks! Is It Still Possible to Recover Data?

Losing data is a complicated situation and only those who experience it know how desperate it is. In most data recovery scenarios, it is possible to recover all or part of the data, but there are some critical scenarios in which it is impossible to recover the data, one of which is when the read head comes into contact with

READ MORE →

Through unique technologies Digital Recovery can bring back encrypted data on any storage device, offering remote solutions anywhere in the world.

Discover the invisible vulnerabilities in your IT – with the 4D Pentest from Digital Recovery