RansomHouse is constantly evolving and finding new methods to encrypt stolen data, demonstrating that the tactics used by cybercriminals are always changing. The new methods that RansomHouse has implemented for encrypting files make recovering those files after an attack almost impossible.
RansomHouse also introduced a new encryption utility called "Mario." While the name may seem playful, the tool is incredibly dangerous. Mario uses two unique encryption keys to encrypt files, rather than just one. This means that even if an individual is able to decipher one layer of encryption, there is an additional layer of encryption that will still keep the individual from accessing the files.
Have you ever struggled with trying to recover files after an attack? This is one of the primary reasons that recovery efforts seem so daunting.
A Smarter Way to Lock Files
In the past, RansomHouse encrypted files using a single encryption technique. The company has since moved away from this method and now utilizes multiple techniques to encrypt stolen files. This increase the difficulty level of recovering them and this multi-layered approach for file encryption is known as multi-layered data processing.RansomHouse also introduced a new encryption utility called "Mario." While the name may seem playful, the tool is incredibly dangerous. Mario uses two unique encryption keys to encrypt files, rather than just one. This means that even if an individual is able to decipher one layer of encryption, there is an additional layer of encryption that will still keep the individual from accessing the files.
Have you ever struggled with trying to recover files after an attack? This is one of the primary reasons that recovery efforts seem so daunting.
Why Security Teams Should Be Worried
There are significant implications for defenders as a result of this upgrade. Below are the risks associated with this upgraded version of RansomHouse.- Increased encryption complexity delays recovery.
- Multi-layer data obfuscation makes the means for encrypting the data difficult to identify
- File randomness complicates file analysis.