L
Electronic Warfare Associates p
Evidence of the hack is still visible online because Google has cashed the ransom notes and encrypted files.
The encrypted files and ransom note are associated with a Ryuk ransomware infection.
In response to the incident, the company took down the infected web servers, but according to ZDNet other EWA websites have been impacted, including EWA Government Systems Inc., EWA Technologies Inc., Simplicikey, and Homeland Protection Institute.
At the time, Electronic Warfare Associates
A few days ago, security experts from MalwareHunterTeam have discovered a new version of the Ryuk Stealer malware that has been enhanced to allow its operators to steal a greater amount of confidential files related to the military, government, financial statements, and banking.
Anyone remember this "Ryuk Stealer"? Just because got a new sample. Took a quick look already and found that:
— MalwareHunterTeam (@malwrhunterteam) January 24, 2020
– they still not removed the Ryuk references ()
– payload (the stealer itself) still has the same icon (helpful)
– they added about 20 new keywords…
cc @VK_Intel https://t.co/LacWzA06TV
The new variant of the Ryuk Stealer malware implements a new file content scanning feature and is able to search for additional keywords in the filenames for data
It is not clear if the malware was developed by the threat actors behind Ryuk Ransomware for data
[adrotate banner=”9″] | [adrotate banner=”12″] |
(
[adrotate banner=”5″]
[adrotate banner=”13″]