ShrinkLocker Strikes Again: Ransomware Havoc with Microsoft BitLocker

ShrinkLocker ransomware is exploiting Microsoft BitLocker to encrypt corporate files, steal decryption keys, and demand payments. Kaspersky detected this threat in Mexico, Indonesia, and Jordan, targeting steel and vaccine manufacturers, plus a government entity. Businesses should limit user privileges, use strong passwords, and monitor for…

Hot Take:

Just when you thought BitLocker was your best friend, along comes ShrinkLocker to prove that even your favorite security tools can be turned against you. It’s like finding out your guard dog has a side hustle robbing your house.

Key Points:

– ShrinkLocker ransomware uses Microsoft BitLocker to encrypt corporate files and extort payment.
– Detected in Mexico, Indonesia, and Jordan, targeting diverse sectors like steel, vaccine manufacturing, and government entities.
– Uses VBScript for Windows Management Instrumentation probing to adapt to different Microsoft OS versions.
– Performs disk resizing and partition changes to evade detection before encrypting data.
– Deletes decryption keys locally and changes partition labels to extortionists’ email for ransom communication.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here