{"id":31606,"date":"2019-05-14T03:32:21","date_gmt":"2019-05-14T07:32:21","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=31606"},"modified":"2019-05-14T03:32:21","modified_gmt":"2019-05-14T07:32:21","slug":"this-ransomware-sneakily-infects-victims-by-disguising-itself-with-anti-virus-software","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2019\/05\/14\/this-ransomware-sneakily-infects-victims-by-disguising-itself-with-anti-virus-software\/","title":{"rendered":"This ransomware sneakily infects victims by disguising itself with anti-virus software"},"content":{"rendered":"\n<p> <br>By\u00a0<a href=\"https:\/\/www.zdnet.com\/meet-the-team\/uk\/dannypalmerzdnet\/\">Danny Palmer<\/a>\u00a0&#8211;  A successful family of\u00a0<a href=\"https:\/\/www.zdnet.com\/article\/ransomware-an-executive-guide-to-one-of-the-biggest-menaces-on-the-web\/\"><strong>ransomware<\/strong><\/a><strong>\u00a0<\/strong>which has been terrorising organisations around the world has been updated with a new trick to lure victims into installing file-locking malware: posing as anti-virus software. <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.cyberconservices.com\/wp-content\/uploads\/2019\/05\/hooded-man-2580085__340.jpg\" alt=\"\" class=\"wp-image-31607\" width=\"295\" height=\"190\"\/><\/figure><\/div>\n\n\n\n<p>Dharma first emerged in 2016 and the <strong>ransomware<\/strong> has been responsible for a number of high-profile cyber incidents,\u00a0<a href=\"https:\/\/www.zdnet.com\/article\/texas-hospital-becomes-victim-of-ransomware-patient-data-potentially-leaked\/\">including the takedown of a hospital network in Texas late last year<\/a>.<\/p>\n\n\n\n<p>The group behind Dharma regularly look to update their campaigns in order to ensure the attacks remain effective and they have the best chance of extorting ransom payments in exchange for decrypting locked networks and files of Windows systems.  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.zdnet.com\/article\/this-ransomware-sneakily-infects-victims-by-disguising-itself-with-anti-virus-software\/&amp;ct=ga&amp;cd=CAEYCioTODUxMjU2OTc2ODYyMjQyMjI4NjIaZjk1ZDdkNTc3NTkyZGUyMTpjb206ZW46VVM&amp;usg=AFQjCNEBjM4IHSdXZ3QDwb_OWN9j_qcSPw\">Read more: <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By\u00a0Danny Palmer\u00a0&#8211; A successful family of\u00a0ransomware\u00a0which has been terrorising organisations around the world has been updated with a new trick to lure victims into installing file-locking malware: posing as anti-virus software. Dharma first emerged in 2016 and the ransomware has <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2019\/05\/14\/this-ransomware-sneakily-infects-victims-by-disguising-itself-with-anti-virus-software\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[636],"tags":[637],"class_list":["post-31606","post","type-post","status-publish","format-standard","hentry","category-ransomware","tag-ransomware"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31606","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=31606"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31606\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=31606"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=31606"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=31606"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}