{"id":86262,"date":"2018-05-16T16:57:25","date_gmt":"2018-05-16T11:27:25","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=86262"},"modified":"2018-05-17T12:00:37","modified_gmt":"2018-05-17T06:30:37","slug":"breed-mbr-infecting-ransomware-analysis-quick-heal-security-labs","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/breed-mbr-infecting-ransomware-analysis-quick-heal-security-labs\/","title":{"rendered":"Breed of MBR Infecting Ransomware \u2013 an analysis by Quick Heal Security Labs"},"content":{"rendered":"<p>Ransomware is becoming one of the most perilous cyberattack methods and also the most habitual techniques for cybercriminals to earn money. It appears to have new weapons in its arsenal over time which is invariably aimed to boost its strength and enhance its business.<\/p>\n<p>As encrypting the files and restricting the user access is not enough, ransomware also infects the master boot record and prevent the operating system from loading. As the operating system is not loaded, none of the ransomware tool or antivirus work for these type of ransomware. Even though this technique is also seen last year (in case of PETYA ransomware), this year there has been an exponential increase in MBR infection by ransomware.<\/p>\n<p>MBR infection extends the scope for deep infection and controls the infected computers, which make the attack more severe. Ransomware copies the original MBR and overwrites it with its own malicious code. After that, it automatically restarts the system for the infection to take place. When the system restarts, the user is locked out and the ransomware displays its note and asks for a ransom.<\/p>\n<p><strong>Master Boot Record<\/strong><\/p>\n<p>Master Boot Record (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Master_boot_record\">MBR<\/a>) is a small program that executes every time the computer boots, even before operating system loads. It is used for start-up process and has information of bootable partition. The MBR resides on the first sector of the hard disk.<\/p>\n<p><strong>OS Booting Sequence<\/strong><\/p>\n<figure id=\"attachment_86263\" aria-describedby=\"caption-attachment-86263\" style=\"width: 590px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86263\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/05\/Fig-1.-OS-booting-Process.png\" alt=\"\" width=\"590\" height=\"372\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-1.-OS-booting-Process.png 590w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-1.-OS-booting-Process-300x189.png 300w\" sizes=\"(max-width: 590px) 100vw, 590px\" \/><figcaption id=\"caption-attachment-86263\" class=\"wp-caption-text\">Fig 1. OS booting Process<\/figcaption><\/figure>\n<p>BIOS tries to read the first physical sector i.e. MBR from the boot device. If no MBR is found, an error message is displayed. Since the MBR executes every time a computer is started, an MBR infection can be extremely dangerous.<\/p>\n<p>Recently, Quick Heal Security Labs analyzed various ransomware as well as MBR infections. This additional infection feature grasps attention which is trending in almost all the upcoming ransomware. We will discuss few of the recent ransomware.<\/p>\n<p><strong>Annabelle ransomware<\/strong><\/p>\n<p>Annabelle ransomware goes a step ahead in infection and comes up with the whole shooting match to vandalize a computer. It takes your computer hostage and does everything to ruin the system.<\/p>\n<p>It encrypts all files on a computer and appends the .annabelle extension to the encrypted files, it attempts to disable the firewall, terminates the list of processes including security programs, spreads via connected USB drives and ultimately, overwrites the MBR with its own code. It destroys every hard disk connected to the system. It adds its entry in the registry to automatically execute when a user logs into Windows.<\/p>\n<p>In fig 2, we see a pseudo-code of the malware which calls CreateFileA for taking the physical drive handle and write 0x800 bytes on each physical drive. Also, it does not take backup of clean MBR.<\/p>\n<figure id=\"attachment_86264\" aria-describedby=\"caption-attachment-86264\" style=\"width: 553px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86264\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/05\/Fig-2.-Calling-CreatFileA-for-taking-handle-to-write-on-physical-drive.jpg\" alt=\"\" width=\"553\" height=\"266\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-2.-Calling-CreatFileA-for-taking-handle-to-write-on-physical-drive.jpg 553w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-2.-Calling-CreatFileA-for-taking-handle-to-write-on-physical-drive-300x144.jpg 300w\" sizes=\"(max-width: 553px) 100vw, 553px\" \/><figcaption id=\"caption-attachment-86264\" class=\"wp-caption-text\">Fig 2. Calling CreatFileA for taking handle to write on physical drive<\/figcaption><\/figure>\n<p>After infecting the hard disk, RtlSetProcessIsCritical\u00a0is called &#8211; this function sets your process to a system critical status. As a result, the termination of this process will result in a termination of Windows as well.\u00a0Calling RtlSetProcessIsCritical (1, 0, 0)\u00a0will set the process as critical.<\/p>\n<figure id=\"attachment_86265\" aria-describedby=\"caption-attachment-86265\" style=\"width: 599px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86265\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/05\/Fig-3.-Calling-RtlSetProcessIsCritical.jpg\" alt=\"\" width=\"599\" height=\"222\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-3.-Calling-RtlSetProcessIsCritical.jpg 599w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-3.-Calling-RtlSetProcessIsCritical-300x111.jpg 300w\" sizes=\"(max-width: 599px) 100vw, 599px\" \/><figcaption id=\"caption-attachment-86265\" class=\"wp-caption-text\">Fig 3. Calling RtlSetProcessIsCritical<\/figcaption><\/figure>\n<p>It finally calls shutdown.exe with parameter -r -f -t 0 to restart the system, -r is used for complete shutdown and restart of the system and -t to force running applications to close without forewarning user. After system restart, the malware file gets executed and a ransom note is displayed as shown in fig 4. This is the first image after infection. <strong>The ransom asked is 0.1 Bitcoin<\/strong>. The malware also sets the countdown timer for paying ransom within that time.<\/p>\n<figure id=\"attachment_86266\" aria-describedby=\"caption-attachment-86266\" style=\"width: 572px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86266\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/05\/Fig-4.-Ransomware-1st-image-after-reboot.jpg\" alt=\"\" width=\"572\" height=\"350\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-4.-Ransomware-1st-image-after-reboot.jpg 572w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-4.-Ransomware-1st-image-after-reboot-300x184.jpg 300w\" sizes=\"(max-width: 572px) 100vw, 572px\" \/><figcaption id=\"caption-attachment-86266\" class=\"wp-caption-text\">Fig 4. Ransomware 1st image after reboot<\/figcaption><\/figure>\n<p>If the user does not pay the ransom within the time limit displayed on the screen set by the malware, the screen is changed as shown in fig 5 and the user is locked out. The malware finally replaces the MBR and makes the system unfit for use.<\/p>\n<figure id=\"attachment_86267\" aria-describedby=\"caption-attachment-86267\" style=\"width: 557px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86267\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/05\/Fig-5.-Ransomware-2nd-image-after-reboot.jpg\" alt=\"\" width=\"557\" height=\"315\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-5.-Ransomware-2nd-image-after-reboot.jpg 557w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-5.-Ransomware-2nd-image-after-reboot-300x170.jpg 300w\" sizes=\"(max-width: 557px) 100vw, 557px\" \/><figcaption id=\"caption-attachment-86267\" class=\"wp-caption-text\">Fig 5. Ransomware 2nd image after reboot<\/figcaption><\/figure>\n<p>Its pure intention is to destroy the system completely if the user refuses to pay the ransom. Initially, it seems that it is just a ransomware which encrypts files although at a later phase, its behavior clarifies that it wants to deliberately destroy the user\u2019s hard disk data.<\/p>\n<p><strong>MBRLock Ransomware<\/strong><\/p>\n<p>MBRLocker a.k.a. DexLocker was identified in Feb 2018. This ransomware modifies the master boot record of the victim&#8217;s computer and asks for a ransom of 30 <a href=\"https:\/\/en.wikipedia.org\/wiki\/Yuan_(currency)\">Yuan<\/a> before Windows starts.<\/p>\n<p>The malware file is compiled in Visual C++. On execution, it tries to read the physical drive using createfile API and takes access of the physical drive.<\/p>\n<figure id=\"attachment_86268\" aria-describedby=\"caption-attachment-86268\" style=\"width: 557px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86268\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/05\/Fig-6.-Calling-CreateFileA.jpg\" alt=\"\" width=\"557\" height=\"120\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-6.-Calling-CreateFileA.jpg 557w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-6.-Calling-CreateFileA-300x65.jpg 300w\" sizes=\"(max-width: 557px) 100vw, 557px\" \/><figcaption id=\"caption-attachment-86268\" class=\"wp-caption-text\">Fig 6. Calling CreateFileA<\/figcaption><\/figure>\n<p>Then it calls SetFilePointer and sets the offset to zero of the physical drive to access MBR. It reads 0x200 bytes of the physical drive in memory and writes on another sector for restoring in future. Fig 7 shows the file pointer is set to 0x400 for writing clean MBR for backup.<\/p>\n<figure id=\"attachment_86269\" aria-describedby=\"caption-attachment-86269\" style=\"width: 594px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86269\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/05\/Fig-7.-Calling-SetFilePointer.jpg\" alt=\"\" width=\"594\" height=\"241\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-7.-Calling-SetFilePointer.jpg 594w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-7.-Calling-SetFilePointer-300x122.jpg 300w\" sizes=\"(max-width: 594px) 100vw, 594px\" \/><figcaption id=\"caption-attachment-86269\" class=\"wp-caption-text\">Fig 7. Calling SetFilePointer<\/figcaption><\/figure>\n<p>The hard disk view before replacing code is shown in fig 8.<\/p>\n<figure id=\"attachment_86270\" aria-describedby=\"caption-attachment-86270\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86270\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/05\/Fig-8.-View-of-hard-disk-before-infection.jpg\" alt=\"\" width=\"610\" height=\"425\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-8.-View-of-hard-disk-before-infection.jpg 610w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-8.-View-of-hard-disk-before-infection-300x209.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-8.-View-of-hard-disk-before-infection-560x390.jpg 560w\" sizes=\"(max-width: 610px) 100vw, 610px\" \/><figcaption id=\"caption-attachment-86270\" class=\"wp-caption-text\">Fig 8. View of hard disk before infection<\/figcaption><\/figure>\n<p>It stores the clean MBR at 0x400 offset i.e., 2nd sector of the hard disk and replaces the original MBR with the malicious code. Fig 9 shows the write operation &amp; length of bytes to be written.<\/p>\n<figure id=\"attachment_86278\" aria-describedby=\"caption-attachment-86278\" style=\"width: 570px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86278\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/05\/Fig1-9.-Process-Monitor-showing-read-write-operation.jpg\" alt=\"\" width=\"570\" height=\"274\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig1-9.-Process-Monitor-showing-read-write-operation.jpg 570w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig1-9.-Process-Monitor-showing-read-write-operation-300x144.jpg 300w\" sizes=\"(max-width: 570px) 100vw, 570px\" \/><figcaption id=\"caption-attachment-86278\" class=\"wp-caption-text\">Fig 9. Process Monitor showing read-write operation<\/figcaption><\/figure>\n<p>After taking a copy of the clean MBR, the malware writes a malicious code at zero offset so that whenever the system boots, the malicious code executes first.<\/p>\n<figure id=\"attachment_86272\" aria-describedby=\"caption-attachment-86272\" style=\"width: 563px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86272\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/05\/Fig-10.-Writing-Malicious-Code-At-0-offset.jpg\" alt=\"\" width=\"563\" height=\"242\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-10.-Writing-Malicious-Code-At-0-offset.jpg 563w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-10.-Writing-Malicious-Code-At-0-offset-300x129.jpg 300w\" sizes=\"(max-width: 563px) 100vw, 563px\" \/><figcaption id=\"caption-attachment-86272\" class=\"wp-caption-text\">Fig 10. Writing Malicious Code At 0 offset<\/figcaption><\/figure>\n<p>Hard disk view after replacing MBR with malware code is shown in fig 11.<\/p>\n<figure id=\"attachment_86273\" aria-describedby=\"caption-attachment-86273\" style=\"width: 629px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86273\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/05\/Fig-11.-Hard-disk-view-after-infection.jpg\" alt=\"\" width=\"629\" height=\"433\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-11.-Hard-disk-view-after-infection.jpg 629w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-11.-Hard-disk-view-after-infection-300x207.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-11.-Hard-disk-view-after-infection-567x390.jpg 567w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-11.-Hard-disk-view-after-infection-229x158.jpg 229w\" sizes=\"(max-width: 629px) 100vw, 629px\" \/><figcaption id=\"caption-attachment-86273\" class=\"wp-caption-text\">Fig 11. Hard disk view after infection<\/figcaption><\/figure>\n<p>After replacing MBR, the malware calls ExitWindowEx API to restart the system.<\/p>\n<figure id=\"attachment_86274\" aria-describedby=\"caption-attachment-86274\" style=\"width: 556px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86274\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/05\/Fig-12.-Calling-ExitWindowEx-API.jpg\" alt=\"\" width=\"556\" height=\"86\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-12.-Calling-ExitWindowEx-API.jpg 556w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-12.-Calling-ExitWindowEx-API-300x46.jpg 300w\" sizes=\"(max-width: 556px) 100vw, 556px\" \/><figcaption id=\"caption-attachment-86274\" class=\"wp-caption-text\">Fig 12. Calling ExitWindowEx API<\/figcaption><\/figure>\n<p>When the system restarts, an image is displayed as shown in fig 13. The malware does not allow the user to log in to the system. It asks for a ransom for unlocking. The message which is displayed on the screen with ascii skull is \u201csend 30 yuan to the 2055965068 qq address in order to get access to their computer again\u201d.<\/p>\n<figure id=\"attachment_86275\" aria-describedby=\"caption-attachment-86275\" style=\"width: 544px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86275\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/05\/Fig-13.Message-after-rebooting-the-system.jpg\" alt=\"\" width=\"544\" height=\"303\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-13.Message-after-rebooting-the-system.jpg 544w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-13.Message-after-rebooting-the-system-300x167.jpg 300w\" sizes=\"(max-width: 544px) 100vw, 544px\" \/><figcaption id=\"caption-attachment-86275\" class=\"wp-caption-text\">Fig 13.Message after rebooting the system<\/figcaption><\/figure>\n<p>When ransom amount is sent to the specified address of the malware author, it may send the password for unlocking the screen. The password can also be tried if we use brute force method. The password may be cracked easily with this technique.<\/p>\n<p>In an analysis of 16-bit code of MBR, the malware compares the entered Password with one string which is present in its code. The String or we say the password is \u201cssssss\u201d. Unlike other ransomware, unlocking the screen of this ransomware is quite easy which can be done without paying any ransom.<\/p>\n<figure id=\"attachment_86276\" aria-describedby=\"caption-attachment-86276\" style=\"width: 557px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86276\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/05\/Fig-14.-Checking-password-in-MBR-code.jpg\" alt=\"\" width=\"557\" height=\"408\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-14.-Checking-password-in-MBR-code.jpg 557w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-14.-Checking-password-in-MBR-code-300x220.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-14.-Checking-password-in-MBR-code-532x390.jpg 532w\" sizes=\"(max-width: 557px) 100vw, 557px\" \/><figcaption id=\"caption-attachment-86276\" class=\"wp-caption-text\">Fig 14. Checking password in MBR code<\/figcaption><\/figure>\n<p>If the same password is entered in the locked screen, then the malware restores the original MBR present at 3rd sector (sector count start from 1) and unlocks the screen. Fig 15 shows the read and write original MBR after the correct password is found.<\/p>\n<figure id=\"attachment_86277\" aria-describedby=\"caption-attachment-86277\" style=\"width: 557px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86277\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/05\/Fig-15.-Read-and-write-operation-on-disk.jpg\" alt=\"\" width=\"557\" height=\"215\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-15.-Read-and-write-operation-on-disk.jpg 557w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/05\/Fig-15.-Read-and-write-operation-on-disk-300x116.jpg 300w\" sizes=\"(max-width: 557px) 100vw, 557px\" \/><figcaption id=\"caption-attachment-86277\" class=\"wp-caption-text\">Fig 15. Read and write operation on disk<\/figcaption><\/figure>\n<ul>\n<li>MBRLock Ransomware is quite easy to unlock although all are not same as seen in case of Annabelle ransomware which destroys each hard disk and does not allow the user to boot system properly. Some more MBR infecting ransomware are KillDiskFake ransomware and DiskWriter or Uselessdisk ransomware.<\/li>\n<li>Some ransomware may write some bytes in a sequence which may or may not make any sense to the user. On the other hand, some purposely wipe out all the data of hard disk for destruction purpose like in case of killDiskFake ransomware.<\/li>\n<\/ul>\n<p><strong>Conclusion<\/strong><\/p>\n<p>In this blog post, we have explained ransomware whose target is to gain money by infecting MBR. This ransomware has taken the level of infection at a higher level. Infected MBR does not allow the user to even boot system in safe mode.<\/p>\n<p><strong>Prevention measures to stay away from ransomware<\/strong><\/p>\n<ul>\n<li>Altering of MBR and other sectors in the hard drive requires advance privileges. That means one can effectively avoid infection by lowering their privilege level and extending the security level in the systems. Using a non-admin user account will reduce the damage caused by a virus infection.<\/li>\n<li>Avoid clicking on suspicious links or email attachments.<\/li>\n<li>Apply the latest security patches to fix the vulnerabilities in Windows in order to diminish the chance of attack.<\/li>\n<li>We recommend our users keep their antivirus products up-to-date.<\/li>\n<\/ul>\n<p><strong>Indicators of compromise<\/strong><\/p>\n<p>7a243bcbff4309eafd287ecc124606171724da76fc3c1896002e5f7392b13df3<br \/>\nDfc56a704b5e031f3b0d2d0ea1d06f9157758ad950483b44ac4b77d33293cb38<\/p>\n<p><strong>Subject Matter Expert<\/strong><br \/>\nPreksha Saxena | Quick Heal Security Labs<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware is becoming one of the most perilous cyberattack methods and also the most habitual techniques for cybercriminals to earn money. It appears to have new weapons in its arsenal over time which is invariably aimed to boost its strength and enhance its business. As encrypting the files and restricting the user access is not [&hellip;]<\/p>\n","protected":false},"author":45,"featured_media":86288,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24],"tags":[49,50],"class_list":["post-86262","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware","tag-malware","tag-ransomware"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86262"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/45"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=86262"}],"version-history":[{"count":2,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86262\/revisions"}],"predecessor-version":[{"id":86283,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86262\/revisions\/86283"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/86288"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=86262"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=86262"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=86262"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}