Rorschach the first and fastest ransomware

: Its research department Check Point, Check Point (CPR) identified a new sophisticated, easy to evade and extremely fast Ransomware, which:

rorschach

● Nicknamed “Rorschach” by , encrypts almost twice as fast as LockBit

● It is more sophisticated than traditional ransomware and combines tactics from multiple known attacks as well as new unique features for maximum damage and to evade cyber security solutions

Rorschach was developed using the DLL side-loading vulnerability of a commercial security product. CPR notified Palo Alto Networks of the vulnerability in its product. Check Point customers remain Rorschach protected

Sergey Shykevich, Threat Intelligence Group Manager at Check Point Research said:

“Just like a psychological Rorschach test looks different to each person, this new type of ransomware has high levels of technically distinct characteristics taken from different ransomware families – making it distinct and different. We are talking about the fastest and one of the most sophisticated ransomware we have seen so far. It highlights the rapidly changing nature of cyber attacks and the need for companies to develop a prevention solution that can stop the Rorschach from of their data.”

More details at blog of Check Point Software :

https://blog.checkpoint.com/research/what-do-the-inkblots-tell-you-check-point-researchers-unveil-rorschach-previously-unseen-fastest-ever-ransomware/

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.
rorschach, ransomware

Written by newsbot

Although the press releases will be from very select to rarely, I said to go ... because sometimes the authors are hiding.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).