What is Sodinokibi Ransomware?

Sodinokibi (source: malwarebytes.com)
Encryption message by attackers (source: malwarebytes.com)
  • It exploits an Oracle WebLogic Server vulnerability [CVE-2019–2725]
  • It targets Windows systems [Malwarebytes]
  • Attackers are associated with GradCrab ransomware family
  • It uses AES and Salasa20 encryption algorithms
  • Also known as REvil and Sodin
  • IOCs (File Hashes) related to Sodinokibi:
  • Take a deep dive on this ransomware at acronis.com




#probability #statistics #ML #DL #coding #security #building #digest

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

How to Enhance the Security of your Crypto Wallet

Staking Update: Week 51! April 26, 2021 🚀

Castles vs. Coalitions: How militaries protect their estates from supply chain cyber attacks

DIDComm and the Self-Sovereign Internet

Lie Proofed Internet

IDOR leads to account takeover

How to Tell If Your Phone Is Hacked and How to Fix It

Signing GIT Commits with GPG

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


#probability #statistics #ML #DL #coding #security #building #digest

More from Medium

The seven elements required in a good note-taking application.

CertBot 我又來了

Expanding/Replacing a ZFS drive vDev on ZFS on Linux

5 Ways to Protect Corporate Virtual Private Networks