Threat Report: Illuminating Volume Shadow Deletion

Executive Summary Ransomware is one of the greatest threats to all industries. Threat actors have the ability to severely hinder, or destroy, the operations of organizations that range from small non-profits to global corporations. While there are many research studies on ransomware, this paper will describe specifically its method of destroying a form of Windows … ContinuedThe post Threat Report: Illuminating Volume Shadow Deletion appeared first on VMware Security Blog. More info: https://blogs.vmware.com/security/2022/09/threat-report-illuminating-volume-shadow-deletion.html?utm_source=rss&utm_medium=rss&utm_campaign=threat-report-illuminating-volume-shadow-deletion

Threat Research: New Method of Volume Shadow Backup Deletion Seen in Recent Ransomware

VMware Threat Analysis Unit (TAU) researchers have recently observed a new technique for the deletion of volume shadow copies. In a recent ransomware sample it was discovered that the technique, which could still be in development, uses Windows COM (Component Object Model) libraries like a legitimate backup solution to delete all volume shadow copies resulting … ContinuedThe post Threat Research: New Method of Volume Shadow Backup Deletion Seen in Recent Ransomware appeared first on More info: https://blogs.vmware.com/security/2022/09/threat-research-new-method-of-volume-shadow-backup-deletion-seen-in-recent-ransomware.html?utm_source=rss&utm_medium=rss&utm_campaign=threat-research-new-method-of-volume-shadow-backup-deletion-seen-in-recent-ransomware
Translate »