<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>RANSOMWARE Archives - Andorsoft, SA</title>
	<atom:link href="https://andorsoft.com/en/tag/ransomware/feed/" rel="self" type="application/rss+xml" />
	<link>https://andorsoft.com/en/tag/ransomware/</link>
	<description></description>
	<lastbuilddate>Tue, 18 Jul 2023 09:22:36 +0000</lastbuilddate>
	<language>in GB</language>
	<sy:updateperiod>
	hourly	</sy:updateperiod>
	<sy:updatefrequency>
	1	</sy:updatefrequency>
	

<image>
	<url>https://andorsoft.com/wp-content/uploads/2023/04/cropped-LOGO-ANDORSOFT-white-32x32.png</url>
	<title>RANSOMWARE Archives - Andorsoft, SA</title>
	<link>https://andorsoft.com/en/tag/ransomware/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Growing Increase in Ransomware Attacks: Why is the Threat Multiplying?</title>
		<link>https://andorsoft.com/en/growing-increase-in-ransomware-data-that-multiplies-the-threat/</link>
		
		<dc:creator><![CDATA[Andorsoft]]></dc:creator>
		<pubdate>Tue, 18 Jul 2023 09:18:53 +0000</pubdate>
				<category><![CDATA[Andorsoft]]></category>
		<category><![CDATA[Comercial]]></category>
		<category><![CDATA[andorsoft]]></category>
		<category><![CDATA[Increment d&#039;Atacs de Ransomware]]></category>
		<category><![CDATA[RANSOMWARE]]></category>
		<guid ispermalink="false">https://andorsoft.com/?p=17046</guid>

					<description><![CDATA[<p>After a relatively quiet period in 2022, cybercriminals are back stronger than ever. Ransomware attacks, which decreased dramatically last year, have multiplied in recent months, with cybercriminals using increasingly aggressive methods. The experts at Chainalysis, a company specialized in monitoring the [...]</p>
<p>L'entrada <a href="https://andorsoft.com/en/growing-increase-in-ransomware-data-that-multiplies-the-threat/">Creixent Increment d&#8217;Atacs de Ransomware: Per què es Multiplica la Amença?</a> ha aparegut primer a <a href="https://andorsoft.com/en">Andorsoft, S.A.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>After a relatively quiet period during 2022, cybercriminals are back stronger than ever. Ransomware attacks, which decreased dramatically last year, have multiplied in recent months, with cybercriminals using increasingly aggressive methods.</p>



<p>Experts at Chainalysis, a company specializing in blockchain monitoring, saw a significant reduction in the number of ransomware attacks last year. Cybercriminals got less than $500 million in ransom demanded in cryptocurrencies during this period.</p>



<p>However, 2023 has seen a worrying reversal in this trend. In the first six months of the year, hackers have extorted $449.1 million. If this trend continues, the annual haul could reach as high as $898.6 million, approaching the 2021 record.</p>



<p>At the same time, Chainalysis and other observers, such as ReliaQuest, have seen an increase in ransomware activity. Some groups, such as Lockbit, which can now attack Mac users, have stepped up their efforts.</p>



<p>Despite a decline in earnings last year, criminals have developed &quot;more extreme&quot; extortion tactics, according to Chainalysis&#039; Jackie Burns Koven. Faced with the refusal of their victims to pay, many hackers are resorting to publishing sensitive data and violating personal privacy as an intimidation tactic.</p>



<p>In addition, the first half of 2023 has seen the emergence of a new ransomware group called Royal, which mainly targets US companies, as well as the emergence of Rorschach, a mysterious malware that has established itself as the world&#039;s most feared ransomware.</p>



<p>The proliferation of attacks is also due to the rise of ransomware as a service (RaaS). These malware are available by subscription, allowing any aspiring hacker to deploy ransomware without the need for extensive technical knowledge.</p>



<p>This combination of aggressive extortion methods and accessibility to ransomware services has led to a dramatic increase in attacks. It is crucial that businesses and individuals are more vigilant than ever and take appropriate measures to protect themselves.</p>



<p>source: <a href="https://www.wired.com/story/ransomware-attacks-rise-2023/">wired</a></p><p>L'entrada <a href="https://andorsoft.com/en/growing-increase-in-ransomware-data-that-multiplies-the-threat/">Creixent Increment d&#8217;Atacs de Ransomware: Per què es Multiplica la Amença?</a> ha aparegut primer a <a href="https://andorsoft.com/en">Andorsoft, S.A.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Tanca un dels ransomware més importants &#8220;SHADE&#8221; i demanen perdó¡!</title>
		<link>https://andorsoft.com/en/they-shut-down-one-of-the-most-important-ransomware-shade-and-apologized/</link>
		
		<dc:creator><![CDATA[Andorsoft]]></dc:creator>
		<pubdate>Wed, 29 Apr 2020 07:50:51 +0000</pubdate>
				<category><![CDATA[Comercial]]></category>
		<category><![CDATA[andorsoft]]></category>
		<category><![CDATA[RANSOMWARE]]></category>
		<category><![CDATA[ransomware Shade]]></category>
		<category><![CDATA[security]]></category>
		<guid ispermalink="false">http://andorsoft.ovh/?p=15793</guid>

					<description><![CDATA[<p>Per als que no conegueu el ransomware Shade, cal esmentar que es tracta d&#8217;una amenaça que porta present des 2014. Estem davant d&#8217;un dels clàssics que ha estat present tot aquest temps i que a més ha afectat molts països de món. Ara han decidit finalment deixar el projecte ia més demanar disculpes a les [&#8230;]</p>
<p>L'entrada <a href="https://andorsoft.com/en/they-shut-down-one-of-the-most-important-ransomware-shade-and-apologized/">Tanca un dels ransomware més importants &#8220;SHADE&#8221; i demanen perdó¡!</a> ha aparegut primer a <a href="https://andorsoft.com/en">Andorsoft, S.A.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">For those of you who are not familiar with the Shade ransomware, it should be mentioned that it is a threat that has been present since 2014. We are facing one of the classics that has been present all this time and that has also affected many countries around the world.</p>
<p style="text-align: justify;">Now they have finally decided to abandon the project and in addition to apologizing to the victims. They have also given instructions on how to recover the files using the keys they have released for this purpose.</p>
<p style="text-align: justify;">But Shade is just one of the threats they have created during this time, albeit the most important. They were also responsible for other Trojans such as Troledesh or Encoder.858.</p>
<p style="text-align: justify;">Beyond publishing all the decryption keys (more than 750,000), they have also included decryption software and have indicated that they expect antivirus companies to issue their own decryption tools now that they have the keys and thus make the task easier for users.</p>
<p style="text-align: justify;">At the moment, Kaspersky antivirus has already updated its decryption tool and introduced the keys for the Shade ransomware. This is one of the most popular options for users and can surely help many of those who have been victims.</p>
<p style="text-align: justify;">Ransomware, as we have indicated, is one of the most important problems on the Internet. It is vital that we always keep common sense in mind, since in many cases it will require user interaction to attack. For example, it can arrive through a malicious attachment, a link that we access for a download or when installing software. Sometimes it takes advantage of possible vulnerabilities, so it is essential that we keep our systems updated.</p><p>L'entrada <a href="https://andorsoft.com/en/they-shut-down-one-of-the-most-important-ransomware-shade-and-apologized/">Tanca un dels ransomware més importants &#8220;SHADE&#8221; i demanen perdó¡!</a> ha aparegut primer a <a href="https://andorsoft.com/en">Andorsoft, S.A.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>IMPROVED security</title>
		<link>https://andorsoft.com/en/security-improvements/</link>
		
		<dc:creator><![CDATA[Andorsoft]]></dc:creator>
		<pubdate>Tue, 25 Feb 2020 10:34:27 +0000</pubdate>
				<category><![CDATA[Comercial]]></category>
		<category><![CDATA[andorsoft]]></category>
		<category><![CDATA[millores seguretat]]></category>
		<category><![CDATA[RANSOMWARE]]></category>
		<category><![CDATA[seguretat]]></category>
		<guid ispermalink="false">http://andorsoft.ovh/?p=15762</guid>

					<description><![CDATA[<p>From andorsoft we are constantly concerned about your security. For this reason we let you know that the latest version of the ransomware is capable of contaminating switched off replicas in different datastores. This is a DEADLY attack in any scenario, and for any company. The only way to be sure not to lose all your […]</p>
<p>L'entrada <a href="https://andorsoft.com/en/security-improvements/">MILLORES seguretat</a> ha aparegut primer a <a href="https://andorsoft.com/en">Andorsoft, S.A.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="size-full wp-image-15510 aligncenter" src="http://andorsoft.ovh/wp-content/uploads/2018/08/andorsoft-Transparente-V-2-cópia.png" alt="" width="117" height="80" /></p>
<p>&nbsp;</p>
<p style="text-align: justify;">From andorsoft we are constantly concerned about your security. For this reason we inform you that the latest version of the ransomware is capable of contaminating switched off replicas in different datastores.</p>
<p>This is a DEADLY attack in any scenario, and for any company.</p>
<p>The only way to be sure not to lose all your information is to make copies to removable devices.</p>
<p>We recommend that you have a 4TB USB so that you can change them daily or weekly and have a safe backup.</p>
<p style="text-align: justify;"> We remain at your disposal for any clarification,</p>
<p>Andorsoft</p><p>L'entrada <a href="https://andorsoft.com/en/security-improvements/">MILLORES seguretat</a> ha aparegut primer a <a href="https://andorsoft.com/en">Andorsoft, S.A.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How does @Varonis #protectyourfileservers and #protectyourNAS from #ransomware and #cyberattacks?</title>
		<link>https://andorsoft.com/en/how-does-varonis-protectyourfileservers-and-protectyournas-from-ransomware-and-cyberattacks/</link>
		
		<dc:creator><![CDATA[Andorsoft]]></dc:creator>
		<pubdate>Tue, 16 May 2017 09:27:07 +0000</pubdate>
				<category><![CDATA[Comercial]]></category>
		<category><![CDATA[CIBERATAC]]></category>
		<category><![CDATA[RANSOMWARE]]></category>
		<category><![CDATA[varonis]]></category>
		<guid ispermalink="false">http://andorsoft.ovh/?p=15235</guid>

					<description><![CDATA[<p>Varonis stops #ransomware when it manages to go beyond your work computers – protecting your company&#039;s most critical file, email and NAS servers.</p>
<p>L'entrada <a href="https://andorsoft.com/en/how-does-varonis-protectyourfileservers-and-protectyournas-from-ransomware-and-cyberattacks/">How does @Varonis #protectyourfileservers and #protectyourNAS from #ransomware and #cyberattacks?</a> ha aparegut primer a <a href="https://andorsoft.com/en">Andorsoft, S.A.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Varonis stops #ransomware when it manages to go beyond your work computers – protecting your company&#039;s most critical file, email and NAS servers.</p><p>L'entrada <a href="https://andorsoft.com/en/how-does-varonis-protectyourfileservers-and-protectyournas-from-ransomware-and-cyberattacks/">How does @Varonis #protectyourfileservers and #protectyourNAS from #ransomware and #cyberattacks?</a> ha aparegut primer a <a href="https://andorsoft.com/en">Andorsoft, S.A.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How we can help protect you from #cyberattacks. With @ZeedSecurity and its daily monitoring tools, it is the best prevention against # cyberattacks.</title>
		<link>https://andorsoft.com/en/how-can-we-help-you-protect-yourself-from-cyberattacks-with-zeedsecurity-and-its-daily-monitoring-tools-is-the-best-prevention-against-cyberattacks/</link>
		
		<dc:creator><![CDATA[Andorsoft]]></dc:creator>
		<pubdate>Tue, 16 May 2017 08:55:16 +0000</pubdate>
				<category><![CDATA[Comercial]]></category>
		<category><![CDATA[CIBERATAC]]></category>
		<category><![CDATA[RANSOMWARE]]></category>
		<category><![CDATA[ZeedSecurity]]></category>
		<guid ispermalink="false">http://andorsoft.ovh/?p=15231</guid>

					<description><![CDATA[<p>http://andorsoft.ovh/noticia-ciberatac-ransomware/</p>
<p>L'entrada <a href="https://andorsoft.com/en/how-can-we-help-you-protect-yourself-from-cyberattacks-with-zeedsecurity-and-its-daily-monitoring-tools-is-the-best-prevention-against-cyberattacks/">Com et podem ajudar a protegir-te dels #ciberatacs. Amb @ZeedSecurity i les seves eines de monitoratge diari, es la millor prevenció en front als #ciberatacs.</a> ha aparegut primer a <a href="https://andorsoft.com/en">Andorsoft, S.A.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>http://andorsoft.ovh/noticia-ciberatac-ransomware/</p><p>L'entrada <a href="https://andorsoft.com/en/how-can-we-help-you-protect-yourself-from-cyberattacks-with-zeedsecurity-and-its-daily-monitoring-tools-is-the-best-prevention-against-cyberattacks/">Com et podem ajudar a protegir-te dels #ciberatacs. Amb @ZeedSecurity i les seves eines de monitoratge diari, es la millor prevenció en front als #ciberatacs.</a> ha aparegut primer a <a href="https://andorsoft.com/en">Andorsoft, S.A.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NEWS #CIBERATAC #RANSOMWARE</title>
		<link>https://andorsoft.com/en/news-cyberattack-ransomware/</link>
		
		<dc:creator><![CDATA[Andorsoft]]></dc:creator>
		<pubdate>Tue, 16 May 2017 08:44:54 +0000</pubdate>
				<category><![CDATA[Comercial]]></category>
		<category><![CDATA[CIBERATAC]]></category>
		<category><![CDATA[RANSOMWARE]]></category>
		<guid ispermalink="false">http://andorsoft.ovh/?p=15225</guid>

					<description><![CDATA[<p>Des de ANDORSOFT i amb el suport del nostre partner tecnològic ZEED SECURITY volem expressar la nostra solidaritat amb els varismilers d&#8217;empreses en més de 150 països que han estat infectades pel virus &#8216;ransomware&#8217; WannaCry en els últims dies. Confiem que el problema serà resolt ràpidament. A continuació detallem, l&#8217;origen i el procés que aquest ciberatac [&#8230;]</p>
<p>L'entrada <a href="https://andorsoft.com/en/news-cyberattack-ransomware/">NOTÍCIA #CIBERATAC #RANSOMWARE</a> ha aparegut primer a <a href="https://andorsoft.com/en">Andorsoft, S.A.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">From ANDORSOFT and with the support of our technological partner ZEED SECURITY we want to express our solidarity with the thousands of companies in more than 150 countries that have been infected by the WannaCry ransomware virus in recent days. We trust that the problem will be resolved quickly.</p>
<p>Below we detail the origin and process that this cyberattack has used for its rapid spread.</p>
<p>The origin of the attack was associated with an MS Office vulnerability, a vulnerability published on 3/14 and its corrective measures.<br />
Other exploits linked to perimeter defensive systems (Firewall, Antivirus, Certified Email...) would also have been executed due to lack of maintenance on them and have &quot;opened the doors&quot; to the exposure of the devices.<br />
Once devices are infected, ransomware can spread freely across the network due to the lack of good IT health practices by leaving SMB protocols open and unencrypted.</p>
<p>* Server Message Block (SMB) is a network protocol that allows sharing files, printers, etc., between nodes of a computer network that use the Microsoft Windows operating system and, using a remote command execution vulnerability, is distributed to the rest of the Windows machines on the same network.</p>
<p>In summary, three simple recommendations; present in all EAIS – Zeedsecurity audits, which, if implemented correctly after detection, would have acted preventively, contributing to preventing infection of the device.</p>
<p>EAIS/EAES 24/7 is an excellent tool for daily monitoring of security and management of corrective measures to be implemented.</p><p>L'entrada <a href="https://andorsoft.com/en/news-cyberattack-ransomware/">NOTÍCIA #CIBERATAC #RANSOMWARE</a> ha aparegut primer a <a href="https://andorsoft.com/en">Andorsoft, S.A.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>