Rorschach the first and fastest ransomware

Rorschach: Its research department Check Point, Check Point Research (CPR) identified a new sophisticated, easy to evade and extremely fast Ransomware, which:

rorschach

● Nicknamed “Rorschach” by Check Point Research, it encrypts nearly twice as fast as LockBit

● It is more sophisticated than traditional ransomware and combines tactics from multiple known attacks as well as new unique features for maximum damage and to evade cyber security solutions

Rorschach was developed using the DLL side-loading vulnerability of a commercial security product. CPR notified Palo Alto Networks of the vulnerability in its product. Check Point customers remain Rorschach protected

Sergey Shykevich, Threat Intelligence Group Manager at Check Point Research said:

“Just like a psychological Rorschach test looks different to each person, this new type of ransomware has high levels of technically distinct characteristics taken from different ransomware families – making it distinct and different. We are talking about the fastest and one of the most sophisticated ransomware we have seen so far. It highlights the rapidly changing nature of cyber attacks and the need for companies to develop a prevention solution that can stop Rorschach from encrypting their data.”

More details at blog of Check Point Software :

https://blog.checkpoint.com/research/what-do-the-inkblots-tell-you-check-point-researchers-unveil-rorschach-previously-unseen-fastest-ever-ransomware/

iGuRu.gr The Best Technology Site in Greece
Follow us on Google News

rorschach, ransomware

Written by newsbot

Although the press releases will be from very select to rarely, I said to go ... because sometimes the authors are hiding.

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).