Posts

BLACKCAT RANSOMWARE

Based on our profiling analysis, the site is largely operated by east-European individuals based on sentence structure. The communiction site also offers an intermediary access (private access to negotiators). Primary motivation is based on monetary gain and the group offers access to their encryption software (aka Malware aka Ransomware) on a paid and commission based subscription model (RaaS). The group has no political interests but CYPFER has noticed that no attacks against Russian/Ukrainian or other East-European attacks were evident or supported by the group. NOTE:   Whenever a ransomware group offers “private access” to negotiators, ensure that you request full transcript of any out of band communications. Transparency throughout the negotiation process is critical to keep victims informed of any communication protocols, decisions and information that might be critical not only to the negotiation process itself but also to the investigation into the incident and to ensu...

CYPFER RECEIVES MULTI-MILLION-DOLLAR INVESTMENT FROM PRIVATE EQUITY FIRM

  CYPFER, a market leader in ransomware consulting and advisory, today announced that it has closed on a substantial multi-million-dollar investment from an international private equity firm. Neither the exact amount of the investment nor its terms were disclosed. “Specifically, the investment will go toward expanding and improving our services including Post-Breach Remediation, Data Restoration, and Cyber Advisory Consulting,” said  Jason Kotler , Founder & President of CYPFER. “the investment will allow CYPFER to better help clients in distress from ransomware attacks. Both downtime and recovery time from cyber-attacks have been costly and crippling to businesses of various sizes” said Kotler. “Equally important, the investment will allow us to operationalize long-term plans for CYPFER including adding leading-edge technologies and infrastructure to expand to markets in the US, Canada, and Europe,” said Kotler. CYPFER’s five services include:   1...

CYPFER CORP LAUNCHES NEW WEBSITE

  CYPFER, a market leader in Cybersecurity and ransomware recovery advisory, today launched its new website:  www.CYPFER.com CYPFER’s  five key services pillars now offer a robust, experience based portfolio of reactive and proactive offerings include: 1)  Cyber-Attack Recovery ; 2)  Advisory ; 3)  Cyber Resilience ;  4)  Digital Executive Protection ; and 5)  Ransomware Recovery . “In December 2021, CYPFER received a multi-million-dollar investment from a international private equity firm. This investment will go to toward expanding and improving our services including:   Post-Breach Remediation, Data Restoration, and Cyber Advisory Consulting,” said  Jason Kotler , Founder & President of CYPFER. The company’s  Leadership Team  boasts some of the cybersecurity industry’s heaviest hitters. CYPFER executives and cybersecurity professionals regularly work the world’s prominent insurance carriers, leading l...

CYPFER SUPPORT THE MCMASTER UNIVERSITY RUGBY TEAM

CYPFER is pleased to support the McMaster University Rugby team . In continuation of the CYPFER commitment to support local communities both by education and cyber-awareness, sponsoring various informational events and now we are pleased to support the McMaster University Rugby team. CYPFER believes that team sports teach the next generation both sportsmanship and collaboration which are critical skills for a healthy workplace. Go McMaster! and of course enjoy your new CYPFER swag. Source: Cypfer Security ,  BLACK BASTA RANSOMWARE ,  CYPFER CORP LAUNCHES NEW WEBSITE ,  MULTI-MILLION-DOLLAR INVESTMENT

BLACK BASTA RANSOMWARE – THREAT INTELLIGENCE

Based on our profiling analysis, while the site operators appear to be Ukrainian the platform is open to any affiliate for a fee or as the industry states “Ransomware as a Service”, RaaS. The negotiation/chat site requires a unique key that is left with the ransom notes on the victims machines. They encrypt both LINUX and Windows systems. In all matters CYPFER handled, where payment was completed the threat actors delivered on their promises providing a decryptor and any other deliverables which were agreed to. This is where we have to CAUTION any company impacted by this variant as follows: 1. Decryption is only at BEST around 75-80% effective. This is a very low effectiveness rate. 2. The encryption technology is SLOW and does not handle large files especially HIGH VALUE files like virtual disk such as VMDK or VHD files 3. Under NO CIRCUMSTANCES should you shut-down your systems unless the encryption did not start or you are -certain- that viable backups exist. If you do, you are lik...