Search the Community
Showing results for tags 'ransomware'.
Found 3 results
Does anyone have any information about who is behind the Ransomware attack on eHealth Saskatchewan? Really would just like to find out exactly what they want from the government? Background here: https://www.ehealthsask.ca/NewsPage?StoryID=25
HoldEmUp Private Encryption Locker By REDD (aka Ar1k88) Fork from: https://github.com/private-locker/Private-Encrypted-Locker GitHub URL: https://github.com/private-locker/bashbunny-payloads/tree/master/payloads/library/general/HoldEmUp (Waiting on Official Hak5 Merge) This Script was previously released on here, then taken down. I had decided to release it on here again since we have also released the Source on our Community GitHub. Features: Use 256 AES Encryption to encrypt and secure files with a Uniquely Generated AES Key. Edit "settings.db" to change the file format of encrypted files. No need to 3rd Party Applications to hide documents. "How this was made? I saw how WannaCry and other Ransomware would "Hold You Hostage". So I decided to sit down, make a PoC (Proof of Concept) that quickly turned into a Security Tool that could be used to lock and unlock your own files. So I held onto the files, even released them for Hak5 as a Demo on the BashBunny, but quickly realized it had "Ransomware" qualities. I quickly removed it. But as times come to pass; Security is getting better. There's other Programmers besides myself that could benefit from this project. Prevent the next wave of "Ransomware". -REDD " DO NOT LOSE YOUR LOCKER KEY'S! NO KEY = NO DECRYPTING. YOU HAVE BEEN WARNED!