Ransomware In Action: MedusaLocker ReadText34

  Рет қаралды 71,294

John Hammond

John Hammond

Күн бұрын

Пікірлер: 79
@108kitsune
@108kitsune 2 ай бұрын
Wait the whole video isn't just an ad?! John are you okay? We're here if you need to talk. 😢
@thenorthman7012
@thenorthman7012 Ай бұрын
Ran into DarkSide a few years back, got contracted to cleanup a ransomeware attack on a utilities client in NH, I wont name who but all the desktops were changed to ransom notes, very interesting stuff
@saidjuma1433
@saidjuma1433 Ай бұрын
How do you go about cleaning up ransomware, do you look for decryption keys in memory or on the file system. What’s the process?
@AhsanIqabl
@AhsanIqabl 2 ай бұрын
First time I got some thing important form John in 5 minutes
@LoganChristianson
@LoganChristianson 2 ай бұрын
Most respectful blackmailer.
@privatechannel1272
@privatechannel1272 2 ай бұрын
I liked this video! Do more of these investigations of malware that use various persistence mechanisms, and specifically where you analyzing them in AnyRun or other tools and diving into how malware works, These types of videos enlarge my local brain database of what to look out for in suspicious programs and opens new interesting knowledge about cybersecurity 😉
@hancygamer2607
@hancygamer2607 Ай бұрын
Rrrrr
@hancygamer2607
@hancygamer2607 Ай бұрын
Rrr
@hancygamer2607
@hancygamer2607 Ай бұрын
Rrrŕrr
@hancygamer2607
@hancygamer2607 Ай бұрын
Ŕrŕrrrrrŕ
@privatechannel1272
@privatechannel1272 Ай бұрын
ok can you stop?
@vaibhav3852
@vaibhav3852 Ай бұрын
Do malware code analysis more. it is intresting to see how they stage stuff and try to evade av
@ThisIsJustADrillBit
@ThisIsJustADrillBit 2 ай бұрын
These ones are the craziest. Thank you sir ❤
@jonmanning3523
@jonmanning3523 Ай бұрын
Sql is database stuff more specifically Microsoft sql server. Such as website database for user information and such. Or game servers for some company's. Could be used to store credit card information if used at a company like intuit for example. For those that don't know. Would have to be stopped to be encrypted for ransomware. Atleast as far as I'm aware.
@fr34k09
@fr34k09 2 ай бұрын
"your company network has been penetrated" *curb your enthusiasm outro plays*
@Percenttwoeff
@Percenttwoeff Ай бұрын
The probascis has come from the inside r u sayng arppoisoning is kinda limp?
@uwotm8123
@uwotm8123 Ай бұрын
Giggity
@Macj707
@Macj707 Ай бұрын
Really fun video John!
@kranser
@kranser 2 ай бұрын
Is there any evidence that it can check if you are trying to decrypt a file and destroy the file if you attempt that - or was that just a complete lie?
@noarcc
@noarcc 2 ай бұрын
Probably lies to scare the user.
@Daimondskull_saiyan
@Daimondskull_saiyan Ай бұрын
I do get always spam email but some of the spam emails getting through what can I do about it and what is the solution even that I cannot share my email or information my privacy where I live but I want some some guidance does emails that I get are fake payments and sometimes call anti-virus but I want to know what can I do I hope that you reaching out my question
@threeMetreJim
@threeMetreJim Ай бұрын
Anyrun may be useful but the price is prohibitive. For the free service you get a tiny upload file size by todays standards 16MB. None of the malware I've trapped would be eligible to try on the free service, and some others wouldn't pass the condition for the 100MB file size on the $299/mo plan. Better to teach people how to safely set up and use a dedicated box that runs a virtual machine for analysis purposes.
@BossModeGod
@BossModeGod Ай бұрын
Wym dedicated box ? Sorry i
@threeMetreJim
@threeMetreJim Ай бұрын
@@BossModeGod box = computer set-up (commonly called machine). I didn't want to write machine twice as thought it may be confusing. Turns out box is confusing too. Oh well.
@BossModeGod
@BossModeGod Ай бұрын
@@threeMetreJim oh well. Appreciate it, anyways.
@ardwetha
@ardwetha Ай бұрын
I could Image shift used if you have an unknown amount of for example paths to do stuff, so you do operations and then call %SHIFT \1 so %1 is always the path or variable you are working with.
@nebil_arega
@nebil_arega Ай бұрын
That plug 🤌
@ezzgamal7864
@ezzgamal7864 Ай бұрын
will there be a Part 2 of this investigation ?
@calvinroth6662
@calvinroth6662 2 ай бұрын
Amazing Video. Please give us more of these
@Joe-f1z3h
@Joe-f1z3h Ай бұрын
super cool ty for the content
@johnsheikh3831
@johnsheikh3831 Ай бұрын
John have u seen the article about malware getting into the bios level.
@donnievitelloni3806
@donnievitelloni3806 2 ай бұрын
Still no answer to what that SHIFT /@ command’s purpose was
@ozziedood
@ozziedood Ай бұрын
My guess is that there was an ultra specific use case the developer ran into where he needed to run that specific command or just any command that did nothing. We will probably never know what that use case was. However, it does make it a bit easier for malware classification for both signature and behavior based detection.
@privatechannel1272
@privatechannel1272 2 ай бұрын
*24:55* So can a malware "escape" my VM and infect my Host? How is it possible?
@elementpotato7771
@elementpotato7771 Ай бұрын
There are quite a few ways this can be done, but one of the biggest (and easiest for me to explain) examples I can think of is CVE-2024-22254 from earlier this year. To give a very watered-down explanation, if someone can get admin access to one of your VMs, they can use this exploit to trigger an out-of-bounds write and escape the VM to the host machine. Unfortunately, VMware does not provide many details on the method of exploitation, but there may be a proof of concept I missed. Hope that helps!
@YLprime
@YLprime Ай бұрын
@@elementpotato7771 nice sounds interesting
@privatechannel1272
@privatechannel1272 Ай бұрын
@@elementpotato7771 So just to clarify this up, is a malware able to cause serious damage to my host from the VM, or only minor damage?
@elementpotato7771
@elementpotato7771 Ай бұрын
@@privatechannel1272 I would say it ultimately depends on the malware, but I believe VM escapes are most commonly used for initial access. They are pretty rare, so it’s hard to say for certain. But honestly, in my business environment, I treat all of them as if they have potential to do serious harm to our systems. The reason for this is because even if the VM escape exploit does not cause harm to the machine at all, and is only used to get initial access to the host machine, attackers can then chain other exploits to do malicious activity to the host anyway. (Sorry for any weird formatting, editing comments on mobile is hard)
@privatechannel1272
@privatechannel1272 Ай бұрын
@@elementpotato7771 Ok thanks for providing a little more info 👍 I guess I could also look up some videos on this topic too.
@Golem642
@Golem642 Ай бұрын
I JUST GOT YOUR AD FOR DEVSECCON BEFORE THE VIDEO '??? What ??????
@Comalv
@Comalv Ай бұрын
but if they use cypher there's no way that the attackers can restore your data. So they're really bluffing when they say they can give you a couple of files back
@darkshoxx
@darkshoxx 2 ай бұрын
What a way to open a video 😆
@hamburgerdeluxe8795
@hamburgerdeluxe8795 2 ай бұрын
lets go 2 mill so close John i wish I can subscribe 200 thousand more times
@asf130thecompany7
@asf130thecompany7 Ай бұрын
Kinda wished this was done in live stream but that's just me eh?
@johndeaux8815
@johndeaux8815 Ай бұрын
It'd be interesting to see if it does any communication if the end user modifies files while booting without internet (safe mode no networking, rebooting with the ethernet unplugged) upon reconnection. Interesting video.
@ardwetha
@ardwetha 2 ай бұрын
I always ask myself, how did the malware got admin rights in the first place. User issue? Also I always wanted to use LoL drivers to find one I can use to load drivers without disabling patchguard in windows.
@YLprime
@YLprime Ай бұрын
It got admin right thought that driver included within the malware. That driver is signed, meaning that it is a legit thing, but it has vulnerabilities for the actually malware to exploit and escalate the privilege to system level.
@Macj707
@Macj707 Ай бұрын
I cant use anyrun because I dont have a business email if I recall and that is annoying because I am a broke and learning, I get annoyed by that.
@Test4Malware
@Test4Malware Ай бұрын
can you please share the IOCs?
@agrep
@agrep Ай бұрын
would be interesting to known how the network has been penetrated ⁉
@robw4633
@robw4633 Ай бұрын
Let’s see how long this advert for flare is …
@tonyblack3401
@tonyblack3401 2 ай бұрын
Back up each day, disconnect back up drive. Then restore from backup.
@BullyXGamerz
@BullyXGamerz Ай бұрын
What is your PC or laptop spces.😅😅😅😅I am Your New Subscriber
@Gigra3
@Gigra3 2 ай бұрын
so basically remove cipher from you organization and monitor net.exe as always
@_Yassir_
@_Yassir_ Ай бұрын
Let's put our very important files inside sys32 so they cannot encrypt files inside that because it'll corrupt windows and we'll not be able to see the message lol
@0xnull-r2t
@0xnull-r2t Ай бұрын
WHY??!
@Macj707
@Macj707 Ай бұрын
thanks nerd
@mdreyadmia2552
@mdreyadmia2552 2 ай бұрын
totally awesome
@RadicalGaming1000
@RadicalGaming1000 Ай бұрын
I click on a john hammond video about ransomware and I get a john hammond ad talking about DevSecCon...youtube knows
@Enmstuvwxyz
@Enmstuvwxyz Ай бұрын
Sir can u hack someones phone through their number and erase all of his data file everything.....I'm 16 year's old boy and I'm going through online sxtortion I'm getting blackmailed that he will upload my video on social media and also asking money from me can u please² help me..🙏🙏😭😭😭sir PLEASEEEEE HELP ME he gave me 2 days to pay money and if i dont he's gonna upload it so please.........
@WreathsByBellaDecor
@WreathsByBellaDecor Ай бұрын
Bro you’re fucked😅
@notavoicechanger1808
@notavoicechanger1808 Ай бұрын
Video idea: Using cheat engine to tinker with windows applications to see if you get any interesting results. Example: Using the Windows Drive Letter changing functionality to change it to a unique hex value. (Maybe even just lowercase of the letter). I would but I can't install a VM or I risk being banned from Warzone again.
@InfinityYo
@InfinityYo 2 ай бұрын
Ok
@kalvikaring1304
@kalvikaring1304 Ай бұрын
it was russia ip not estonia!!!
@iamwitchergeraltofrivia9670
@iamwitchergeraltofrivia9670 2 ай бұрын
Windows is destroyed 😊😊😊 super
@BurkenProductions
@BurkenProductions 2 ай бұрын
Easy to restore, ransomware is NOT a problem if you know what you're doing.
@YLprime
@YLprime Ай бұрын
lol like the private key is literally in the registry😂
@iamwitchergeraltofrivia9670
@iamwitchergeraltofrivia9670 Ай бұрын
Or better ransomware Protection windows firewall sucks my ass
@Likemea
@Likemea Ай бұрын
Stop using AI
@keep__laughing
@keep__laughing 2 ай бұрын
2nd view
@hyklmcjger9232
@hyklmcjger9232 2 ай бұрын
2nd!
@tomato.mp4
@tomato.mp4 Ай бұрын
What I would do is shutoff computer then take the hard drive out and get the encrypted files out and the malware executeable then hire a specialist to make a decryptor
@ekowlloyd
@ekowlloyd Ай бұрын
unfortunately it doesn't work that way, there's first the recon stage, bad actors know when best moment to fire of the payload, plus the moment you notice files getting encrypted, it's final stage of a process that started long ago, disconnecting that one pc doesn't mean there the attack is running simultaneously across the network, best bet is having so security best practices in place to contain such threats
@tomato.mp4
@tomato.mp4 Ай бұрын
@@ekowlloyd I didn't mean a network but I always wondered how ransomware could spread through a network since you would be running it on a non admin account and each accounts drive should have bitlocker
@ekowlloyd
@ekowlloyd Ай бұрын
@@tomato.mp4 on a network, the bad actors go through several extend lengths of recon stages to exploit vulnerabilities or find that one colleague that has a file somewhere with passwords stored thinking it's safely hidden, there are tactics to escalate privileges over an extended period, one they gain admin access, they begin the payload. if you are referring to stand-alone device not connected to the network, then indeed pulling the plug might interrupt the payload. ps: no idea why auto-correct messed up my grammar in my first response :p
They Say This Malware is INSANE
51:48
John Hammond
Рет қаралды 82 М.
Self-Extracting Executables for Hackers
41:06
John Hammond
Рет қаралды 86 М.
amazing#devil #lilith #funny #shorts
00:15
Devil Lilith
Рет қаралды 18 МЛН
Walking on LEGO Be Like... #shorts #mingweirocks
00:41
mingweirocks
Рет қаралды 6 МЛН
I Turned My Mom into Anxiety Mode! 😆💥 #prank #familyfun #funny
00:32
He tried to hack me...
34:15
John Hammond
Рет қаралды 384 М.
Free Coding Tool Distributes Malware
42:12
John Hammond
Рет қаралды 135 М.
He Sent Me Minecraft Malware (Java Deobfuscation)
28:40
John Hammond
Рет қаралды 147 М.
how is this hacking tool legal?
11:42
Low Level
Рет қаралды 391 М.
The ULTIMATE Raspberry Pi 5 NAS
32:14
Jeff Geerling
Рет қаралды 2,3 МЛН
Hide your files like a hacker (5 Ways)
19:17
NetworkChuck
Рет қаралды 173 М.
18 Weird and Wonderful ways I use Docker
26:18
NetworkChuck
Рет қаралды 368 М.
How do QR codes work? (I built one myself to find out)
35:13
Veritasium
Рет қаралды 6 МЛН
Mozi Malware - Finding Breadcrumbs...
50:16
John Hammond
Рет қаралды 200 М.
amazing#devil #lilith #funny #shorts
00:15
Devil Lilith
Рет қаралды 18 МЛН