ShrinkLocker Strikes: A New Ransomware Nightmare for Corporate Systems

ShrinkLocker ransomware shrinks non-boot partitions to create new boot volumes, using Windows BitLocker for encryption. Kaspersky warns it targets specific Windows versions and industries, like government and manufacturing. The malware bypasses TPM requirements and leaves minimal recovery options, urging companies to secure BitLocker keys and…

Hot Take:

ShrinkLocker is like that roommate who rearranges your furniture while you’re asleep, but instead of feng shui, it’s aiming for chaos and encrypted doom. Who knew Windows BitLocker would get its own evil twin?

Key Points:

  • New ransomware strain ShrinkLocker uses Windows BitLocker to encrypt systems by creating new boot partitions.
  • ShrinkLocker targets government entities and companies in the vaccine and manufacturing sectors.
  • Detects Windows versions and proceeds if parameters like domains and OS versions are met.
  • Modifies registry entries to disable remote desktop connections and enable BitLocker encryption.
  • Lacks a ransom note; instead, uses boot partition labels as a contact method, indicating a potentially destructive intent rather than financial gain.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here