❌

Normal view

There are new articles available, click to refresh the page.
Yesterday β€” 17 May 2024Main stream

Study Suggests Waiting Longer Before Withdrawing Life Support

17 May 2024 at 05:03
A review of a limited number of cases of unresponsive patients with severe traumatic brain injuries raised questions about a custom of making a decision within 72 hours.

Β© Shannon Stapleton/Reuters

A new study found that 42 percent of those who had continued life support recovered enough in the next year to have some degree of independence. A few even returned to their former lives.
Before yesterdayMain stream

Researchers Observe Potential Ties between Trinity and Venus Ransomware Strains

By: Alan J
12 May 2024 at 23:56

Trinity ransomware Venus ransomware CYBLE

Cybersecurity researchers at Cyble's Research and Intelligence Labs (CRIL) have uncovered a new ransomware variant called Trinity, which employs a double extortion strategy and has potential links to the previously identified Venus ransomware. This article explores the findings about the Trinity ransomware strain as well as the noted similarities between the Trinity and Venus ransomware strains.

Uncovering Tactical and Technical Details of Trinity Ransomware

CRIL researchers observed a new ransomware variant called Trinity, that employs common double extortion tactics such as exfiltrating data from victim's systems before encrypting them, and the intent to use both a support and leak site in their operations. The support site allows victims to upload sample files less than 2MB in size for decryption, while the leak site though currently empty, threatens to expose victim data. [caption id="attachment_68024" align="alignnone" width="940"]Trinity Ransomware Source: Cyble Blog[/caption] Upon initial stages of the investigation, researchers observed similarities between the Trinity ransomware and the 2023Lock ransomware which has been active since early 2024. The deep similarities between the two variants such as identical ransom notes, and code suggest that Trinity might be a newer variant of the 2023Lock ransomware. Researchers noted an intricate execution process in the ransomware's operations such as a search for a ransom note within its binary file and immediately terminates if the file is unavailable. The ransomware collects system information such as the processor count, the pool of threads, and existing drives to prepare its multi-threaded encryption process. The ransomware then attempts privilege escalation by impersonating a legitimate process's token for its own usage, enabling the ransomware to bypass security measures. The ransomware deploys network enumeration activity along with lateral movement, demonstrating broad attack capability. [caption id="attachment_68025" align="alignnone" width="547"]Trinity ransomware Venus ransomware Source: Cyble Blog[/caption] The Trinity variant employs the ChaCha20 algorithm to encrypt of victim files. After encryption, filenames are appended with β€œ.trinitylock,” while ransom notes are left in both text and .hta formats in. The ransomware also modifies the desktop wallpaper to the ransomware note and uses a specific registry key to facilitate this change.

Similarities Between Trinity Ransomware and Venus Ransomware

The connections between Trinity and Venus go beyond mere similarities in their ransom notes and registry usage. Venus, an established ransomware operation with a global reach, emerged around mid-2022. The similarities between Venus and Trinity extend to their usage of identical registry values and consistency in their mutex naming conventions and code base. Additionally, the ransom notes used by both ransomware variants exhibit a similar format. The shared tactics and techniques indicate a possible collaboration between the two groups. This collaboration could lead to the exchange of techniques, tools, and infrastructure, amplifying the scale and sophistication of future ransomware campaigns. CRIL researchers have advised organizations to stay vigilant and implement robust cybersecurity measures to protect against these evolving threats. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Study Suggests Genetics as a Cause, Not Just a Risk, for Some Alzheimer’s

6 May 2024 at 12:19
People with two copies of the gene variant APOE4 are almost certain to get Alzheimer’s, say researchers, who proposed a framework under which such patients could be diagnosed years before symptoms.

Β© Vsevolod Zviryk/Science Source

A C.T. scan of a patient with Alzheimer’s disease.

Drought That Snarled Panama Canal Was Linked to El NiΓ±o, Study Finds

1 May 2024 at 01:01
The low water levels that choked cargo traffic were more closely tied to the natural climate cycle than to human-caused warming, a team of scientists has concluded.

Β© Nathalia Angarita for The New York Times

A cargo ship in the Panama Canal in September. Officials last year had to slash the number of vessels allowed through.

WWA Study Points to Role of Hot Oceans in Recent Dubai Floods

25 April 2024 at 11:42
An international team of researchers found that heavy rains were intensifying in the region, though they couldn’t say for sure how much climate change was responsible.

Β© Giuseppe Cacace/Agence France-Presse β€” Getty Images

Stranded vehicles on a flooded highway in Dubai on April 18.

Colorado Bill Aims to Protect Consumer Brain Data

18 April 2024 at 10:38
In a first, a Colorado law extends privacy rights to the neural data increasingly coveted by technology companies.

Β© Winni Wintermeyer for The New York Times

Siddharth Hariharoan tries to control a toy helicopter with his mind through the MindWave Mobile, a device by NeuroSky that reads brain waves.

Colorado Bill Aims to Protect Consumer Brain Data

18 April 2024 at 10:38
In a first, a Colorado law extends privacy rights to the neural data increasingly coveted by technology companies.

Β© Winni Wintermeyer for The New York Times

Siddharth Hariharoan tries to control a toy helicopter with his mind through the MindWave Mobile, a device by NeuroSky that reads brain waves.
❌
❌