{"id":30298,"date":"2019-01-30T03:25:53","date_gmt":"2019-01-30T08:25:53","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=30298"},"modified":"2019-01-30T03:25:53","modified_gmt":"2019-01-30T08:25:53","slug":"new-ransomware-poses-as-games-and-software","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2019\/01\/30\/new-ransomware-poses-as-games-and-software\/","title":{"rendered":"New ransomware poses as games and software"},"content":{"rendered":"\n<p>A new form of <strong>ransomware<\/strong> is infecting users around the world by disguising itself as applications or games and tricking victims into downloading and launching it on their PCs.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.cyberconservices.com\/wp-content\/uploads\/2019\/01\/240_F_164071544_qAHYE0iv2fTvmOEHXel6Mysqq4BEMSA3.jpg\" alt=\"\" class=\"wp-image-30299\" width=\"233\" height=\"149\"\/><\/figure><\/div>\n\n\n\n<p>Anatova <strong>ransomware<\/strong> first emerged on January 1 this year and the new code behind it suggests that the cyber criminals distributing it are experienced malware developers.<\/p>\n\n\n\n<p>It displays the ability to morph quickly, with the potential for new evasion tactics and spreading mechanisms to be easily added.\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.techrepublic.com\/article\/modular-anatova-ransomware-encrypts-data-as-quickly-as-possible-before-detection\/\" target=\"_blank\">Anatova<\/a>\u00a0also comes equipped with strong encryption, using a pair of RSA keys to lock users out of files \u2014 a tactic also used by some of the most successful ransomware families like\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.zdnet.com\/article\/double-trouble-two-pronged-cyber-attack-infects-victims-with-data-stealing-trojan-malware-and-ransomware\/\" target=\"_blank\">GandCrab<\/a>\u00a0and\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.zdnet.com\/article\/crysis-ransomware-master-keys-released-to-the-public\/\" target=\"_blank\">Crysis<\/a>.  <a href=\"https:\/\/www.zdnet.com\/article\/new-ransomware-poses-as-games-and-software-to-trick-you-into-downloading-it\/\">Read more:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new form of ransomware is infecting users around the world by disguising itself as applications or games and tricking victims into downloading and launching it on their PCs. Anatova ransomware first emerged on January 1 this year and the <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2019\/01\/30\/new-ransomware-poses-as-games-and-software\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[636],"tags":[637],"class_list":["post-30298","post","type-post","status-publish","format-standard","hentry","category-ransomware","tag-ransomware"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/30298","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=30298"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/30298\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=30298"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=30298"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=30298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}