Ransomware Written In PowerShell (And How To Disable It)


We’re huge fans of the flexibility of Windows’ PowerShell scripting language, but we’ve never contemplated using it to write malware. That hasn’t stopped one group of enterprising criminals building PowerShell-based ransomware aimed at Russian computer users, but fortunately it turns out PowerShell can also be used to remedy the issue.

Sophos’ Naked Security blog details how the software works: it installs a PowerShell script (downloading PowerShell if it’s not already on the system), uses it to encrypt files on the target machine, and then demands a payment of more than $300 to unencrypt that data. Nasty.

Fortunately, as the post points out, undoing the actions of the malware is also possible using PowerShell:

In both cases the encryption key can be recovered without paying for it. In fact, this can be done using the same PowerShell tool that the attackers used.

Hit the post for a more detailed description of the malware and how to remove it (if your existing security solution didn’t already detect and block it).

Russian ransomware takes advantage of Windows PowerShell [Naked Security]


The Cheapest NBN 50 Plans

Here are the cheapest plans available for Australia’s most popular NBN speed tier.

At Lifehacker, we independently select and write about stuff we love and think you'll like too. We have affiliate and advertising partnerships, which means we may collect a share of sales or other compensation from the links on this page. BTW – prices are accurate and items in stock at the time of posting.

Comments


Leave a Reply