{"id":7037,"date":"2022-07-13T13:50:31","date_gmt":"2022-07-13T04:50:31","guid":{"rendered":"https:\/\/cyberenso.jp\/?p=7037"},"modified":"2022-08-19T13:53:24","modified_gmt":"2022-08-19T04:53:24","slug":"new-c-c-ransomware-operation-emerges","status":"publish","type":"post","link":"https:\/\/cyberenso.jp\/en\/new-c-c-ransomware-operation-emerges\/","title":{"rendered":"New C\/C++ ransomware operation emerges"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7037\" class=\"elementor elementor-7037\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4d68864 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4d68864\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-dfcd04a\" data-id=\"dfcd04a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-55286d8 elementor-widget elementor-widget-text-editor\" data-id=\"55286d8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>On Tuesday 12th of July 2022, researchers at Cyble released a report that revealed a series of new ransomware operations including the &#8216;Lilith&#8217; ransomware operation who has already posted its first victim on a data leak site. Based on the analysis by the Cyble researchers, Lilith is C\/C++ console-based ransomware which is designed for 64-bit versions of Windows.<\/p><p>The operation seems to follow the current trends of most active ransomware operations including performing double-extortions tactics. The analysis determined that there are no new novelties have been introduced by this operation yet and it has been discovered that the Lilith ransomware code has remnants from the leaked BABUK code as the ransomware contains an exclusion for \u201cecdh_pub_k.bin\u201d which is used to store the local public key of BABUK ransomware infections.<\/p><p>The first victim of the Lilith ransomware operation was a large construction group based in South America, although the posting has been recently removed.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>On Tuesday 12th of July 2022, researchers at Cyble released a report that revealed a series of new ransomware operations including the &#8216;Lilith&#8217; ransomware operation who has already posted its first victim on a data leak site. Based on the analysis by the Cyble researchers, Lilith is C\/C++ console-based ransomware which is designed for 64-bit versions of Windows. The operation<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":7042,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,10,12,9,2,1],"tags":[],"class_list":["post-7037","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest_news","category-latest_vulnerabilities","category-read_article","category-ransomware_criminals","category-ce_news","category-uncategorized"],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2022\/08\/02.jpg?fit=1377%2C995&ssl=1","_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/7037"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=7037"}],"version-history":[{"count":6,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/7037\/revisions"}],"predecessor-version":[{"id":7046,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/7037\/revisions\/7046"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/7042"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=7037"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/categories?post=7037"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/tags?post=7037"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}