You can check the latest ransomware information.
[ Cipher ransomware ]
[Virus/Malware Activity Report: Cipher Ransomware]
In response to a breach believed to be in the form of Cipher ransomware,
we would like to confirm the situation and provide a warning as follows.
Cipher ransomware
The ransomware is called Cipher and has an encrypted name. It appears that all files are being changed with the extension cipher8.
How it works
file version
[Figure 1 File version]
[Figure 2 File properties]
behavioral process
WMI command – Check specific process
Check if there is a specific attack target such as SQL using WMI commands.
[Figure 3 WMI command]
Force quit a specific process
Forcefully terminates specific processes such as SQL using the CMD command.
[Figure 4 Force termination of specific process]
Select attack target
Attacks target removable or fixed disks.
[Figure 5 Selection of attack target]
Infection results
The instructions file is created in each folder with the name !-Recovery_Instructions-!.html, and when encryption is performed,
[Figure 6 Infection result 1]
[Figure 7 Infection result 2]
White Defender compatible
It supports real-time automatic restoration of files that will be encrypted before the malicious actions and blocking of White Defender ransomware.
[Figure 8 Block message]
[Figure 9 Block message]