Security

CSO

ShrinkLocker ransomware scrambled your files? Free decryption tool to the rescue

Plus: CISA's ScubaGear dives deep to fix M365 misconfigs


Bitdefender has released a free decryption tool that can unlock data encrypted by the ShrinkLocker ransomware.

Bitdefender made the decryptor publicly available following an extensive analysis of the malware strain, which was uncovered in May and found to use VBScript and Microsoft Windows' built-in BitLocker encryption feature to scramble victims' files.

That’s a crude approach compared to those used by more modern ransomware strains. But Bitdefender reckons using these "relics from the past" makes ShrinkLocker "a surprisingly simple yet effective ransomware."

"By using a combination of Group Policy Objects (GPOs) and scheduled tasks, it can encrypt multiple systems within a network in as little as 10 minutes per device," explained Martin Zugec, technical solutions director at Bitdefender.

"This simplicity makes the attack particularly attractive to individual threat actors who may not be part of a larger ransomware-as-a-service (RaaS) ecosystem," he added in a Wednesday write-up.

Bitdefender's analysis includes a link to download its free decryption tool, which has been added to the security shop's collection of 32 previously released ransomware decryptors. The antivirus maker also details the full nine-step process to install the decryption software.

However, as Zugec warns, "decryptor tools are inherently reactive – often limited to specific timeframes or software versions."

Another thing to remember is that while decryptors can restore your data, they don't prevent future attacks or stop digital thieves from selling or leaking info they've already stolen.

"We strongly recommend reviewing our recommendations section for additional guidance, including specific tips on configuring BitLocker to minimize the risk of successful attacks," Zugec noted.

In May, Russian antivirus slinger Kaspersky spotted criminals using ShrinkLocker to target steel and vaccine manufacturers, plus government entities in Mexico, Indonesia, and Jordan.

Microsoft has also warned that Iranian miscreants had abused Windows' built-in BitLocker to encrypt compromised devices. ®

Another freebie to peruse: CISA's M365 infosec improver

In other free-infosec-help news, the US Cybersecurity and Infrastructure Security Agency (CISA) has seen a surge in downloads of its ScubaGear software, which automates assessment of Microsoft 365 configurations and searches for security gaps that could leave organizations vulnerable to exploitation.

After analyzing configurations, the software suggests changes that improve M365 security.

Since it debuted in October 2022, CISA has recorded over 30,000 downloads of the tool.

In a Wednesday post, SCuBA product manager Chad Poland and capacity building senior advisor Rachel Kelly noted "downloads significantly increased with the recent release of ScubaGear version 1.3.0 in June 2024."

Considering that misconfigs were the initial access point [PDF] for 30 percent of all cloud environment attacks during the first half of the year, according to Google, taking the plunge to check out ScubaGear seems entirely sensible.

Send us news
3 Comments

Ransomware scum blow holes in Cleo software patches, Cl0p (sort of) claims responsibility

But can you really take crims at their word?

Suspected LockBit dev, facing US extradition, 'did it for the money'

Dual Russian-Israeli national arrested in August

What do ransomware and Jesus have in common? A birth month and an unwillingness to die

35 years since AIDS first borked a PC and we're still no closer to a solution

UK ICO not happy with Google's plans to allow device fingerprinting

Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more

BlackBerry offloads Cylance's endpoint security products to Arctic Wolf

Fresh attempt to mix the perfect cocktail of IoT and Infosec

US reportedly mulls TP-Link router ban over national security risk

It could end up like Huawei -Trump's gonna get ya, get ya, get ya

Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat'

Personal and financial data probably stolen

Microsoft won't let customers opt out of passkey push

Enrollment invitations will continue until security improves

Australia moves to drop some cryptography by 2030 – before quantum carves it up

The likes of SHA-256, RSA, ECDSA and ECDH won't be welcome in just five years

How Androxgh0st rose from Mozi's ashes to become 'most prevalent malware'

Botnet's operators 'driven by similar interests as that of the Chinese state'

Blocking Chinese spies from intercepting calls? There ought to be a law

Sen. Wyden blasts FCC's 'failure' amid Salt Typhoon hacks

Critical security hole in Apache Struts under exploit

You applied the patch that could stop possible RCE attacks last week, right?