Skip to content

Latest commit

 

History

History
33 lines (26 loc) · 1.62 KB

encrypt-impact.md

File metadata and controls

33 lines (26 loc) · 1.62 KB
ID E1486
Objective(s) Impact
Related ATT&CK Techniques Data Encrypted for Impact, Data Encrypted for Impact (Mobile)

Data Encrypted for Impact

Malware may encrypt files stored on the system to prevent user access until a ransom is paid and/or to interrupt system availability. The encryption process usually iterates over all letter drives in the system (except for CD drives) and then recursively encrypts all files with specific suffixes.

See ATT&CK: Data Encrypted for Impact and Data Encrypted for Impact (Mobile).

Methods

Name ID Description
Ransom Note E1486.001 Ransomware displays a ransom note. Ransom notes are sometimes used to link instances of ransomware, even when the code or anti-analysis techniques change.

Malware Examples

Name Date Description
CryptoWall 2014 [1]
CryptoLocker 2013 [2]
Locky Bart 2017 Encrypts files for ransom without any connection to the Internet.
SamSam 2015 Ransomware.

References

[1] http://www.secureworks.com/cyber-threat-intelligence/threats/cryptowall-ransomware/

[2] http://www.secureworks.com/cyber-threat-intelligence/threats/cryptolocker-ransomware/