{"id":20965,"date":"2022-03-29T09:34:08","date_gmt":"2022-03-29T13:34:08","guid":{"rendered":"https:\/\/www.technewsday.com\/?p=20965"},"modified":"2022-03-30T10:22:55","modified_gmt":"2022-03-30T14:22:55","slug":"attackers-still-using-suncrypt-ransomware-to-compromise-organizations","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/attackers-still-using-suncrypt-ransomware-to-compromise-organizations\/","title":{"rendered":"Attackers Still Using SunCrypt Ransomware To Compromise Organizations"},"content":{"rendered":"<p data-ar-index=\"0\">SunCrypt ransomware operators are still using the ransomware to compromise organizations. According to Minerva Labs, the gang recently compromised Migros, Switzerland&#8217;s largest supermarket.<\/p>\n<p data-ar-index=\"1\">The malware operators have developed a better version of their strain which offers new capabilities. The capabilities include process termination, stopping services, and wiping the machine clean for ransomware execution.<\/p>\n<p data-ar-index=\"2\">The process termination feature includes resource-heavy processes that can block the encryption of open data files such as WordPad (documents), SQLWriter (databases), and Outlook (emails).<\/p>\n<p data-ar-index=\"3\">SunCrypt operators however retained the use of I\/O completion ports for faster encryption through process threading.<\/p>\n<p data-ar-index=\"4\">They also continue to encrypt both local volumes and network shares while maintaining an allowlist for the Windows directory and other items that render a computer inoperable when compromised.<\/p>\n<p data-ar-index=\"5\">SunCrypt was notoriously known in mid-2020 as one of the pioneers of triple extortion on non-paying victims.<\/p>\n<p data-ar-index=\"6\">For more information, read the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/suncrypt-ransomware-is-still-alive-and-kicking-in-2022\/\" target=\"_blank\" rel=\"noopener\">original story<\/a> in BleepingComputer.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SunCrypt ransomware operators are still using the ransomware to compromise organizations.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[381,16,28],"tags":[443],"class_list":["post-20965","post","type-post","status-publish","format-standard","hentry","category-operations","category-security","category-software","tag-cyber-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/20965","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=20965"}],"version-history":[{"count":3,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/20965\/revisions"}],"predecessor-version":[{"id":20988,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/20965\/revisions\/20988"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=20965"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=20965"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=20965"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}