DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

Kaspersky Identifies New Ransomware Using BitLocker To Encrypt Corporate Data

DigitalCIO Bureau by DigitalCIO Bureau
May 31, 2024
in Tech News
0
Kaspersky Identifies New Ransomware Using BitLocker To Encrypt Corporate Data
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Kaspersky has identified ransomware attacks using Microsoft’s BitLocker to attempt encryption of corporate files. The threat actors remove the recovery options to prevent the files from being restored and use a malicious script with a new feature: it can detect specific Windows versions and enable the BitLocker according to the Windows version. The incidents with this ransomware, dubbed “ShrinkLocker”, and its variants were observed in Mexico, Indonesia, and Jordan. The perpetrators targeted companies in steel and vaccine manufacturing, and a government entity.

 The threat actors are using VBScript – a programming language used to automate tasks on Windows computers – to create a malicious script with previously unreported features to maximise the damage of the attack, Kaspersky Global Emergency Response team reports. The novelty is that the script checks the current version of Windows installed on the system and enables the BitLocker features accordingly. In this way, the script is believed to be able to infect new and legacy systems back to Windows Server 2008.

In case the OS version is suitable for the attack, the script alters the boot settings and attempts to encrypt the whole drives using BitLocker. It establishes a new boot partition, essentially setting up a separate section on the computer’s drive containing the files for booting the operating system. This action is aimed at locking the victim out at a later stage. The attackers also deleted the protectors used to secure BitLocker’s encryption key so that the victim can’t recover them.

The malicious script then sends information about the system and the encryption key generated on the compromised computer to the server controlled by the threat actor. Afterward, it covers its tracks by deleting logs and various files that serve as a hint and help to investigate an attack.

As a final step, malware forces the shutdown of the system – a capability facilitated by the creation and reinstallation of files in a separate boot partition. The victim sees the BitLocker screen with the message: “There are no more BitLocker recovery options on your PC”.

Kaspersky dubbed the script “ShrinkLocker” as this name highlights the critical procedure of partition resizing, which was essential for the attacker to ensure the system booted correctly with the encrypted files.

“What is particularly concerning about this case is that BitLocker, originally designed to mitigate the risks of data theft or exposure, has been repurposed by adversaries for malicious ends. It’s a cruel irony that a security measure has been weaponised in this way. For companies using BitLocker, it’s crucial to ensure strong passwords and secure storage of recovery keys. Regular backups, kept offline and tested, are also essential safeguards,” explains Cristian Souza, Incident Response Specialist at Kaspersky Global Emergency Response Team.

The incident’s detailed technical analysis is available on Securelist. Kaspersky experts recommend the following mitigation measures to prevent attackers from exploiting the feature described in the report:

  • Use robust, properly configured security software to detect threats that try to abuse Implement Managed Detection and Response (MDR) to proactively seek out threats.
  • Limit user privileges to prevent unauthorised enabling of encryption features or modification of registry keys.
  • Enable network traffic logging and monitoring, capturing both GET and POST requests, as infected systems may transmit passwords or keys to attacker domains.

Monitor for VBScript and PowerShell execution events, saving logged scripts and commands to an external repository for activity retention despite local erasure

Tags: Kaspersky
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Tata Technologies And Emerson To Innovate Advanced Testing Solutions For Next-gen Mobility

by DigitalCIO Bureau
July 12, 2025
0
Tata Technologies And Emerson To Innovate Advanced Testing Solutions For Next-gen Mobility

Tata Technologies and Emerson have announced a strategic partnership to innovate integrated testing and validation solutions for global OEMs in the automotive, aerospace and commercial vehicle sectors. By...

Read moreDetails

Hexaware and Abluva Offer Secure Agentic AI Solutions for Life Sciences Industry

by DigitalCIO Bureau
July 11, 2025
0
Deloitte And AWS To Deepen Generative AI Driven Innovations For Indian Enterprises

Hexaware Technologies has announced a strategic partnership with Abluva, an innovator in agentic AI security, to address security challenges posed by autonomous AI agents in the Life Sciences...

Read moreDetails

TP-Link Reinforces Commitment to India with new R&D GCC & Incubation Centre

by DigitalCIO Bureau
July 11, 2025
0
TP-Link Reinforces Commitment to India with new R&D GCC & Incubation Centre

Connectivity solutions provider TP-Link India have announced a significant expansion of its footprint in the country. TP-Link has unveiled its first incubation centre in India, co-located with its...

Read moreDetails

Gartner: Earth Intelligence Offers $20 bn Opportunity For Tech And Service Providers

by DigitalCIO Bureau
July 10, 2025
0

Earth intelligence will significantly impact every industry as it rapidly moves from government to the private sector, with annual revenue to surpass $4.2 billion in 2030, up from...

Read moreDetails

Okaya Power Group Appoints Prakash Dharmani as CIO

by DigitalCIO Bureau
July 9, 2025
0
Okaya Power Group Appoints Prakash Dharmani as CIO

Prakash Dharmani has joined Okaya Power Group as its new Chief Information Officer (CIO). With over 33 years of experience across industries such as petrochemicals, refining, specialty packaging,...

Read moreDetails
Next Post
IBM Launches Mainframe Skills Council with SHARE

Deloitte India Adopts IBM Cloud to digitally enhance its Cyber Intelligence Centre operations

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

ManageEngine Named A ‘Strong Performer’ In Unified Endpoint Management And Enterprise Service Management

ManageEngine Named A ‘Strong Performer’ In Unified Endpoint Management And Enterprise Service Management

January 4, 2024
Atlassian Intelligence Transforms Teamwork Through Human-AI Collaboration

Atlassian Intelligence Transforms Teamwork Through Human-AI Collaboration

December 13, 2023
Red Hat Announces New Capabilities For Developer Hub

Red Hat Announces New Capabilities For Developer Hub

November 18, 2024

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Dell Technologies Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud HCLTech Honeywell IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope NTT DATA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos Tenable Veeam Veeam Software Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?