{"id":2675,"date":"2022-09-22T12:48:39","date_gmt":"2022-09-22T12:48:39","guid":{"rendered":"https:\/\/www.nebrcentre.co.uk\/?p=2675"},"modified":"2022-09-22T12:48:39","modified_gmt":"2022-09-22T12:48:39","slug":"new-ransomware-encryptions-employed-by-cyber-criminals-pose-huge-threat-to-cyber-security","status":"publish","type":"post","link":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/new-ransomware-encryptions-employed-by-cyber-criminals-pose-huge-threat-to-cyber-security\/","title":{"rendered":"New Ransomware Encryptions Employed By Cyber Criminals Pose Huge Threat to Cyber Security"},"content":{"rendered":"\n<p>According to reports, cyber criminals and malicious groups are using ransomware intermittent encryption technology to bypass cyber security.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/ransomware-actors-embrace\/\">Intermittent encryption<\/a>&nbsp;consists of encrypting only parts of the targeted&nbsp;content, which&nbsp;would still render the data unrecoverable without using a valid&nbsp;decryption key.&nbsp;<\/p>\n\n\n\n<p>As only part of the file is encrypted, the process is much faster and&nbsp;harder to spot, meaning that ransomware detection software can fail to spot such attacks.&nbsp;This is because partially encrypted files may not be regarded as malicious by the software,&nbsp;which&nbsp;usually only recognise attacks on a larger scale where files are fully encrypted.&nbsp;<\/p>\n\n\n\n<p>LockFile, part of the ransomware family,&nbsp;<a href=\"https:\/\/news.sophos.com\/en-us\/2021\/08\/27\/lockfile-ransomwares-box-of-tricks-intermittent-encryption-and-evasion\/\">was noted in 2021<\/a>&nbsp;as the&nbsp;first known ransomware to use intermittent encryption \u2013 it worked by encrypting every 16 bytes of a file. However, since this was reported,&nbsp;several&nbsp;other groups have been found to have deployed this approach.<\/p>\n\n\n\n<p>Other threat actors reported&nbsp;to have&nbsp;used&nbsp;intermittent&nbsp;encryption include&nbsp;Qyick and BlackCat, which are being sought for investigation in lab environments by researchers.&nbsp;<\/p>\n\n\n\n<p>Intermittent encryption poses a huge risk for businesses and individuals alike, as&nbsp;attacks can go virtually undetected, and can be&nbsp;carried out&nbsp;with ease.&nbsp;<\/p>\n\n\n\n<p>Organisations&nbsp;are advised to&nbsp;maintain a secure cyber security system through backups, up&nbsp;to&nbsp;date software, and&nbsp;keeping an eye on the current threat landscape.&nbsp;<\/p>\n\n\n\n<p><strong>If you are concerned about the<\/strong><strong>&nbsp;impact ransomware could have on your business, please contact us at&nbsp;<\/strong><a href=\"mailto:enquiries@nebrcentre.co.uk\"><strong>enquiries@nebrcentre.co.uk<\/strong><\/a><strong><\/strong><\/p>\n\n\n\n<p><strong>To stay up to date with the latest cyber security news,\u00a0and gain access to a wealth of\u00a0<a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/resources\/\">resources<\/a> and support, why not sign up for our\u00a0<\/strong><a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/core-membership-sign-up\/\"><strong>free core membership?<\/strong><\/a><\/p>\n\n\n\n<p>The NEBRC is a non-profit organisation that aims to&nbsp;<a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/services\/\">inform, educate, and support<\/a>&nbsp;businesses across the UK on how to stay safe against online threats and fraud through a strong cyber security strategy.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to reports, cyber criminals and malicious groups are using ransomware intermittent encryption technology to bypass cyber security. Intermittent encryption&nbsp;consists of encrypting only parts of&#8230;<\/p>\n","protected":false},"author":1,"featured_media":2677,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2675","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"acf":[],"_links":{"self":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/posts\/2675","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/comments?post=2675"}],"version-history":[{"count":0,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/posts\/2675\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/media?parent=2675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/categories?post=2675"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/tags?post=2675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}