Ransomware Evades Detection by Intermittent Encryption

Share post:

Attackers are using a new technique called ‘intermittent encryption’ to bypass detection, according to a new report by SentinelOne.

With intermittent encryption, attackers can better bypass systems that use statistical analysis to detect an ongoing ransomware infection.

Since statistical analysis is based on the intensity of the input and output operations of operating system files, the intermittent encryption technique reduces the intensity of the input/output operations of files. It also shows a greater similarity between unencrypted and encrypted versions of a particular file. This is possible because only a few bytes in the file are changed.

The threat groups that already use intermittent encryption include Qyick, PLAY, Agenda, Black Basta and BlackCat/AlPHV ransomware, according to the researchers.

To protect systems from ransomware attacks that bypass detection by intermittent encryption, the researchers advise companies to keep their operating systems and all software running on them up-to-date and patched to prevent them from being compromised by a common vulnerability.

In addition, organizations are advised to use security solutions to try to detect the threat before the ransomware is launched on one or more computers.

It is also important that organizations enable multi-factor authentication and create awareness for every user, especially with regard to emails.

The sources for this piece include an article in TechRepublic.

SUBSCRIBE NOW

Related articles

Cyber Security Today, Week in Review for week ending Friday May 17, 2024

Welcome to Cyber Security Today. This is the Week in Review for the week ending Friday, May 17th,...

Cyber Security Today, May 17, 2024 – Malware hiding in Apache Tomcat servers

Malware hiding in Apache Tomcat servers, new backdoors found, and more Welcome to Cyber Security Today. It's Friday, May...

MIT students exploit blockchain vulnerability to steal 25 million dollars

Two MIT students have been implicated in a highly sophisticated cryptocurrency heist, where they reportedly exploited a vulnerability...

Cyber Security Today, May 15, 2024 – Ebury botnet still exploits Linux servers, Microsoft, SAP and Apple issue security updates

The Ebury botnet continues to exploit Linux servers, Microsoft, SAP and Apple issue security updates, and more. Welcome to...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways