Security

CSO

ShrinkLocker ransomware scrambled your files? Free decryption tool to the rescue

Plus: CISA's ScubaGear dives deep to fix M365 misconfigs


Bitdefender has released a free decryption tool that can unlock data encrypted by the ShrinkLocker ransomware.

Bitdefender made the decryptor publicly available following an extensive analysis of the malware strain, which was uncovered in May and found to use VBScript and Microsoft Windows' built-in BitLocker encryption feature to scramble victims' files.

That’s a crude approach compared to those used by more modern ransomware strains. But Bitdefender reckons using these "relics from the past" makes ShrinkLocker "a surprisingly simple yet effective ransomware."

"By using a combination of Group Policy Objects (GPOs) and scheduled tasks, it can encrypt multiple systems within a network in as little as 10 minutes per device," explained Martin Zugec, technical solutions director at Bitdefender.

"This simplicity makes the attack particularly attractive to individual threat actors who may not be part of a larger ransomware-as-a-service (RaaS) ecosystem," he added in a Wednesday write-up.

Bitdefender's analysis includes a link to download its free decryption tool, which has been added to the security shop's collection of 32 previously released ransomware decryptors. The antivirus maker also details the full nine-step process to install the decryption software.

However, as Zugec warns, "decryptor tools are inherently reactive – often limited to specific timeframes or software versions."

Another thing to remember is that while decryptors can restore your data, they don't prevent future attacks or stop digital thieves from selling or leaking info they've already stolen.

"We strongly recommend reviewing our recommendations section for additional guidance, including specific tips on configuring BitLocker to minimize the risk of successful attacks," Zugec noted.

In May, Russian antivirus slinger Kaspersky spotted criminals using ShrinkLocker to target steel and vaccine manufacturers, plus government entities in Mexico, Indonesia, and Jordan.

Microsoft has also warned that Iranian miscreants had abused Windows' built-in BitLocker to encrypt compromised devices. ®

Another freebie to peruse: CISA's M365 infosec improver

In other free-infosec-help news, the US Cybersecurity and Infrastructure Security Agency (CISA) has seen a surge in downloads of its ScubaGear software, which automates assessment of Microsoft 365 configurations and searches for security gaps that could leave organizations vulnerable to exploitation.

After analyzing configurations, the software suggests changes that improve M365 security.

Since it debuted in October 2022, CISA has recorded over 30,000 downloads of the tool.

In a Wednesday post, SCuBA product manager Chad Poland and capacity building senior advisor Rachel Kelly noted "downloads significantly increased with the recent release of ScubaGear version 1.3.0 in June 2024."

Considering that misconfigs were the initial access point [PDF] for 30 percent of all cloud environment attacks during the first half of the year, according to Google, taking the plunge to check out ScubaGear seems entirely sensible.

Send us news
3 Comments

Biden signs sweeping cybersecurity order, just in time for Trump to gut it

Ransomware, AI, secure software, digital IDs – there's something for everyone in the presidential directive

UK floats ransomware payout ban for public sector

Stronger proposals may also see private sector applying for a payment 'license'

Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

'Codefinger' crims on the hunt for compromised keys

CISA: Wow, that election had a lot of foreign trolling. Trump's Homeland Sec pick: And that's none of your concern

Cyber agency too 'far off mission,' says incoming boss Kristi Noem

Mitel 0-day, 5-year-old Oracle RCE bug under active exploit

3 CVEs added to CISA's catalog

GoDaddy slapped with wet lettuce for years of lax security and 'several major breaches'

Watchdog alleged it had no SIEM or MFA, orders rapid adoption of basic infosec tools

China's Salt Typhoon spies spotted on US govt networks before telcos, CISA boss says

We are only seeing 'the tip of the iceberg,' Easterly warns

Atos denies Space Bears' ransomware claims – with a 'but'

Points finger at third-party infrastructure being breached

Ransomware attack forces Brit high school to shut doors

Students have work to complete at home in the meantime

Microsoft eggheads say AI can never be made secure – after testing Redmond's own products

If you want a picture of the future, imagine your infosec team stamping on software forever

Enzo Biochem settles lawsuit over 2023 ransomware attack for $7.5M

That's in addition to the $4.5M fine paid to three state AGs last year

Miscreants 'mass exploited' Fortinet firewalls, 'highly probable' zero-day used

Ransomware 'not off the table,' Arctic Wolf threat hunter tells El Reg