Ransomware Rumble: DeadLock’s Sneaky Security Sabotage Unveiled

DeadLock ransomware’s new tricks are no laughing matter. Cybersecurity researchers report mischief with a custom encryption routine, the BYOVD technique, and a rogue driver flaw. It’s like a heist movie, minus the popcorn. For a happy ending, beef up your endpoint protection and don’t forget those offline backups!

Pro Dashboard

Hot Take:

Looks like the DeadLock ransomware gang just won the “Worst Houseguest of the Year” award. They crash the party by bringing their own vulnerable driver, then proceed to rummage through your fridge (a.k.a. your endpoint detection tools), and leave a ransom note with more demands than a diva on a world tour. Honestly, can someone please tell them that BYOD stands for Bring Your Own Device, not Driver?

Key Points:

  • DeadLock ransomware uses a sneaky BYOVD method to disable security systems.
  • The attack exploits a vulnerability in Baidu Antivirus driver (CVE-2024-51324).
  • Privilege escalation, registry modifications, and RATs are part of the attack package.
  • Custom encryption with time-based keys and “.dlock” file extensions add to the chaos.
  • Ransom demands are made via Bitcoin or Monero with communication through Session Messenger.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?