You can check the latest ransomware information.
[ Devos ransomware ]
[Virus/Malware Activity Report: Devos Ransomware]
Due to a breach believed to be in the form of Devos ransomware,
we would like to confirm the situation and provide a warning as follows.
Devos ransomware
The ransomware is called Devos and appears to be changing all files with the extension filename.extension.id[private key].[henderson@cock.li].Devos.
How it works
file version

[Figure 1 File version]

[Figure 2 File properties]
behavioral process
- Execute automatic privilege elevation command
Register privilege elevation command using AutoElevation vulnerability

[Figure 3 - Executing automatic privilege elevation command]
Register startup program
Registers itself in the startup program to automatically re-run when Windows starts.

[Figure 4 Startup program registration]
Turn off firewall
Disable firewall settings to make your PC less secure.

[Figure 5 Disable firewall]
Deleting shadow copies
Deletes shadow copies to make recovery difficult after infection.
Infection results
Information files are created in each folder with the names info.txt / info.hta, and when encryption is performed, the files are changed to <file name.extension.id[private key].[ henderson@cock.li].Devos> It's possible.

[Figure 6 Infection result 1]

[Figure 7 Infection result 2]

[Figure 8 Infection result 3]
White Defender compatible
It supports real-time automatic restoration of files that will be encrypted before the malicious actions and blocking of White Defender ransomware.

[Figure 9 Block message]

[Figure 10 Block message]
