New ransomware sodium detected using daylight error
Updated July 17, 2019
Kaspersky Cyber Security researchers have discovered something new
It uses a ransomware encryption method called sodin (SotinocB or Rev).
You recently discovered a vulnerability in Windows to gain additional privileges
The concerned ransomware organization uses the architecture
Identifies the central processing unit (CPU) to avoid operations
In a payment program, this is often not the case.
It is done with a payment program
Kinds of popular malware, we don’t see it often
Refined and versatile version: Consistently uses the processor architecture
Cryptocurrency coins under the radar are not diversity, [Fedor Sinitzin et al
Kaspersky Security Investigator.
The number of encrypted attacks may increase,
Because of the resources available to create such malware
This is important. Naturally invested in malware development
Snitzin had been hoping for a good reward.
Analysts say most of Sodins rental jobs are in Asia – 17.6 percent are authors.
Taiwan has 9.8 percent in Hong Kong and 8.8 percent in South Korea.
However, Kaspersky added that the attacks took place in Europe, North America and Latin America.
Electronic registration costs one person $ 2,500.
Disadvantages of CVE-2018-8453 have been identified using hardware software.
Use the copyrighted version of FruityArmor. The downside is this
To avoid falling
A person with a sodium problem checks to see if they are using the program
Kaspersky said the company updates periodically
Safety products with risk assessment and
They say it can help them master their skills automatically