In recent months, there has been a surge in new variants of the CrySIS/Dharma ransomware. These variants are emerging at a rapid pace, much like mushrooms after a rainstorm.
CrySIS, also known as Dharma, is a type of malware that encrypts the files on a victim's computer and demands a ransom payment in exchange for the decryption key. The original CrySIS ransomware first appeared in 2016, and since then, multiple variants have been discovered.
The new variants of CrySIS/Dharma are particularly dangerous because they are using advanced techniques to evade detection. These techniques include using legitimate digital certificates to sign the malware, and using fileless execution methods to evade detection by traditional anti-virus software.
One of the most recent variants, known as CrySIS v3, has been found to be using a new technique called "domain shadowing" to spread the malware. This technique involves compromising a legitimate domain and using it to host the malware, making it harder for security software to detect and block.
Another new variant, called CrySIS v4, has been found to be using a technique called "living off the land" to evade detection. This technique involves using legitimate tools and scripts that are already installed on a victim's computer to spread the malware, making it harder for security software to detect and block.
The increase in new CrySIS/Dharma variants is a reminder of the importance of keeping software and security systems up-to-date, as well as the need for constant vigilance when it comes to online security. It is also important to have a backup of all important files, as it is the only way to recover them if they are encrypted by this type of malware.
In conclusion, the CrySIS/Dharma ransomware variants are rapidly emerging, using advanced techniques to evade detection. It is crucial to be aware of these new variants and to take the necessary precautions to protect your computer and files. Regularly backup your important files and keep your software and security systems up-to-date to minimize the risk of becoming a victim of this type of malware.

Comments
Post a Comment