Emulating the Systematic LokiLocker Ransomware

AttackIQ has released a new attack graph that emulates the behaviors of LokiLocker ransomware, a .NET based strain active since at least mid-August 2021. The malware combines defense evasion and impact techniques, including disabling Task Manager and Windows Firewall, as well as deleting Volume Shadow Copies to hinder detection and prevent restoration.

The post Emulating the Systematic LokiLocker Ransomware appeared first on AttackIQ.

The post Emulating the Systematic LokiLocker Ransomware appeared first on Security Boulevard.

This article has been indexed from Security Boulevard

Read the original article: