{"id":8278,"date":"2023-04-16T13:08:04","date_gmt":"2023-04-16T04:08:04","guid":{"rendered":"https:\/\/cyberenso.jp\/?p=8278"},"modified":"2023-04-25T13:10:21","modified_gmt":"2023-04-25T04:10:21","slug":"mac-ransomware-encryptors-linked-to-lockbit-founded","status":"publish","type":"post","link":"https:\/\/cyberenso.jp\/en\/mac-ransomware-encryptors-linked-to-lockbit-founded\/","title":{"rendered":"Mac ransomware encryptors linked to LockBit founded"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8278\" class=\"elementor elementor-8278\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d5c0c1b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d5c0c1b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0a57bd0\" data-id=\"0a57bd0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d0bc56a elementor-widget elementor-widget-text-editor\" data-id=\"d0bc56a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>This week, it was discovered that the LockBit ransomware gang has created encryptors targeting Macs and it was confirmed by the public-facing representative of LockBit, known as LockBitSupp, that the Mac encryptor is &#8220;actively being developed&#8221;. The new ransomware encryptor was discovered by cybersecurity researchers\u00a0MalwareHunterTeam\u00a0and Florian Roth.<\/p><p>An analysis of the Apple M1 encryptor\u00a0revealed that parts of the encryptor were out of place or missing which could indicate that those parts were likely thrown together as part of a test and therefore are likely not ready for deployment in actual attacks against macOS devices.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>This week, it was discovered that the LockBit ransomware gang has created encryptors targeting Macs and it was confirmed by the public-facing representative of LockBit, known as LockBitSupp, that the Mac encryptor is &#8220;actively being developed&#8221;. The new ransomware encryptor was discovered by cybersecurity researchers&nbsp;MalwareHunterTeam&nbsp;and Florian Roth. An analysis of the Apple M1 encryptor&nbsp;revealed that parts of the encryptor were<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":8283,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[225,6,10,12,9,2,8,1],"tags":[],"class_list":["post-8278","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-heavy-industry","category-latest_news","category-latest_vulnerabilities","category-read_article","category-ransomware_criminals","category-ce_news","category-industry_sector","category-uncategorized"],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2023\/04\/Picture1-9.jpg?fit=1375%2C916&ssl=1","_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8278"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=8278"}],"version-history":[{"count":6,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8278\/revisions"}],"predecessor-version":[{"id":8286,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8278\/revisions\/8286"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/8283"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=8278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/categories?post=8278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/tags?post=8278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}