In the previous installment of our “import-substitution misadventures,” we took a deep dive into the Kuznyechik (Grasshopper) block cipher defined in GOST 34.12–2015. Alongside Kuznyechik, the standard also specifies another cipher with a 64-bit block size called…
CONTINUE READING 🡒 Author: Drobotun
How to Handle Malware: Complete Guide. Give it to your…
Numerous times you used to help your friends and people when their PCs fell to onslaught of malware. So did we. But we got pretty sick and tired of all that and pulled out a trump card…
CONTINUE READING 🡒 The Children of CryptoLocker, Part 2. TeslaCrypt, TorLocker, TorrentLocker
The first examples of malware that encrypts files and then demands money for decryption appeared a long time ago. Just remember Trojan.Xorist with its primitive encryption algorithm based on XOR, or Trojan.ArchiveLock written in PureBasic, which used…
CONTINUE READING 🡒 The Children of CryptoLocker, Part 1. Critroni, CryptoWall, DirCrypt
The first examples of malware that encrypts files and then demands money for decryption appeared a long time ago. Just remember Trojan.Xorist with its primitive encryption algorithm based on XOR, or Trojan.ArchiveLock written in PureBasic, which used…
CONTINUE READING 🡒