{"id":31655,"date":"2019-06-06T03:50:35","date_gmt":"2019-06-06T07:50:35","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=31655"},"modified":"2019-06-06T03:50:35","modified_gmt":"2019-06-06T07:50:35","slug":"smacking-em-down-with-decryptors","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2019\/06\/06\/smacking-em-down-with-decryptors\/","title":{"rendered":"Smacking &#8216;Em Down With Decryptors"},"content":{"rendered":"\n<p> By <a href=\"https:\/\/www.bleepingcomputer.com\/author\/lawrence-abrams\/\">Lawrence Abrams<\/a> &#8211; This was not a very busy week, with mostly new variants of STOP Djvu and Dharma being released.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.cyberconservices.com\/wp-content\/uploads\/2019\/06\/desktop-wallpaper-1024x615.png\" alt=\"\" class=\"wp-image-31656\" width=\"324\" height=\"187\"\/><\/figure><\/div>\n\n\n\n<p>The bad news is that the RIG exploit kit was discovered distributing the GetCrypt Ransomware through PopCash malvertising campaigns. The good news is that Emsisoft was quickly able to come up with a decryptor for that <strong>ransomware<\/strong> and also released a decryptor for JSWorm 2.0.<\/p>\n\n\n\n<p>Contributors and those who provided new ransomware information and stories this week include:\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/malwareforme\" target=\"_blank\">@malwareforme<\/a>,\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/BleepinComputer\" target=\"_blank\">@BleepinComputer<\/a>,\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/PolarToffee\" target=\"_blank\">@PolarToffee<\/a>,\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/fwosar\" target=\"_blank\">@fwosar<\/a>,\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/jorntvdw\" target=\"_blank\">@jorntvdw<\/a>,\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/demonslay335\" target=\"_blank\">@demonslay335<\/a>,\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/hexwaxwing\" target=\"_blank\">@hexwaxwing<\/a>,\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/LawrenceAbrams\" target=\"_blank\">@LawrenceAbrams<\/a>,\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/FourOctets\" target=\"_blank\">@FourOctets<\/a>,\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/struppigel\" target=\"_blank\">@struppigel<\/a>,\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/DanielGallagher\" target=\"_blank\">@DanielGallagher<\/a>,\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/malwrhunterteam\" target=\"_blank\">@malwrhunterteam<\/a>,\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/Seifreed\" target=\"_blank\">@Seifreed<\/a>,\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/nao_sec\" target=\"_blank\">@nao_sec<\/a>,\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/VK_Intel\" target=\"_blank\">@VK_Intel<\/a>,\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/emsisoft\" target=\"_blank\">@Emsisoft<\/a>,\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/NirajC\" target=\"_blank\">@NirajC<\/a>,\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/WDRBNews\" target=\"_blank\">@WDRBNews<\/a>,\u00a0<a href=\"https:\/\/twitter.com\/x42x5a\">@x42x5a<\/a>,\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/GrujaRS\" target=\"_blank\">@GrujaRS<\/a>,\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/bartblaze\" target=\"_blank\">@bartblaze<\/a>, and\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/HONKONE_K\" target=\"_blank\">@HONKONE_K<\/a>.<a href=\"javascript:void(0)\"><br> <\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.bleepingcomputer.com\/news\/security\/the-week-in-ransomware-may-24th-2019-smacking-em-down-with-decryptors\/&amp;ct=ga&amp;cd=CAEYDyoTOTAyMTc1ODg3NTk2Njg4OTMxMDIaZjk1ZDdkNTc3NTkyZGUyMTpjb206ZW46VVM&amp;usg=AFQjCNG5LPPZ74LVP12Txzpzu1pbFiMU6Q\">Read more: <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Lawrence Abrams &#8211; This was not a very busy week, with mostly new variants of STOP Djvu and Dharma being released. The bad news is that the RIG exploit kit was discovered distributing the GetCrypt Ransomware through PopCash malvertising <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2019\/06\/06\/smacking-em-down-with-decryptors\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[636],"tags":[637],"class_list":["post-31655","post","type-post","status-publish","format-standard","hentry","category-ransomware","tag-ransomware"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31655","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=31655"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31655\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=31655"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=31655"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=31655"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}