ShrinkLocker Ransomware Exploits Microsoft BitLocker for File Encryption

1 min read
Source: BleepingComputer
ShrinkLocker Ransomware Exploits Microsoft BitLocker for File Encryption
Photo: BleepingComputer
TL;DR Summary

A new ransomware strain called ShrinkLocker uses Windows BitLocker to encrypt files by creating new boot partitions, targeting government entities and companies in the vaccine and manufacturing sectors. Written in VBScript, ShrinkLocker detects specific Windows versions and modifies registry entries to disable remote desktop connections and enable BitLocker encryption without a TPM. The malware deletes BitLocker protectors to prevent recovery and uses TryCloudflare to deliver encryption keys. Kaspersky advises secure storage of recovery keys and regular offline backups to mitigate such attacks.

Share this article

Reading Insights

Total Reads

0

Unique Readers

13

Time Saved

4 min

vs 5 min read

Condensed

90%

85082 words

Want the full story? Read the original article

Read on BleepingComputer