{"id":2614,"date":"2020-05-25T07:24:14","date_gmt":"2020-05-25T05:24:14","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=2614"},"modified":"2020-05-25T07:24:16","modified_gmt":"2020-05-25T05:24:16","slug":"ragnarlocker-can-hide-its-presence-in-a-very-neat-way","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/en\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\/","title":{"rendered":"RagnarLocker can hide its presence in a very neat way"},"content":{"rendered":"\n<p>Welcome to the next episode of the\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/xopero.com\/blog\/en\/category\/security-center\/\" target=\"_blank\">Xopero Security Center<\/a>! There is a curious case of\u2026 RagnarLocker ransomware. Its operators are running Oracle VirtualBox to hide its presence on infected computers inside a VM. Does it do the trick? Are they successful? Check below.<\/p>\n\n\n\n<!--more-->\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-1\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"ragnarlocker-ransomware-runs-oracle-virtualbox-to-hide-its-presence-from-antivirus-software\"><strong>RagnarLocker ransomware runs Oracle VirtualBox to hide its presence from antivirus software<\/strong><\/h2>\n\n\n<p>RagnarLocker is not your typical ransomware. Its operators carefully select targets, avoiding home users, and goes strict after corporations and government organizations. They usually gain access by abusing internet-exposed RDP endpoints and has compromised MSP tools to breach targeted companies.<\/p>\n\n\n\n<p>In the past RagnarLocker group deployed a version of their ransomware customized per each victim but recently attackers come up with a novel strategy to avoid detection. Instead of running the ransomware directly on the vulnerable computer, they download and install Oracle VirtualBox. The group then configures the virtual machine to give it full access to all local and shared drives, allowing the VM to interact with files stored outside its own storage. In the next step attackers boot up the virtual machine, load the ransomware inside and run it. And because the ransomware runs inside the VM, the antivirus software won&#8217;t be able to detect any malicious process.<\/p>\n\n\n\n<p>The end? Files on the local system and shared drives are suddenly replaced with their encrypted versions. End the best part &#8211; all the file modifications appear to come from a legitimate process. Brilliant.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.zdnet.com\/article\/ransomware-deploys-virtual-machines-to-hide-itself-from-antivirus-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read more<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-2\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"there-is-a-new-bluetooth-vulnerability-which-exposes-a-wide-range-of-devices-to-the-bias-attack\"><strong>There is a new Bluetooth vulnerability which exposes a wide range of devices to the BIAS attack<\/strong><\/h2>\n\n\n<p>A team of researchers tested the security weakness on a variety of devices, including laptops, tablets, and smartphones from popular consumer brands that were equipped with different versions of the Bluetooth protocol. This is still work in progress but there are at last 28 unique Bluetooth chips vulnerable to the Bluetooth Impersonation AttackS (BIAS).<\/p>\n\n\n\n<p>What is exactly a BIAS attack? This type of attack is able to bypass Bluetooth\u2019s authentication procedures that take place during the establishment of a secure connection. Attackers exploit few flaws such as lack of integrity protection, encryption, and mutual authentication.<\/p>\n\n\n\n<p>During the pairing of two devices, a long-term key is generated that connects the devices together. Once they have done that: each time a secure connection is established, it uses a different session key that is extrapolated from the long-term key and other public factors. Using the flaw, the attacker is then able to impersonate one of the devices that has gone through the authentication process and paired with the other device, without knowing the long-term key. The attacker can then take control of or steal sensitive data from the other device.<\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"BIAS: Bluetooth Impersonation AttackS\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/fASGU7Og5_4?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><strong>Does it mean that your device is vulnerable? <\/strong>Researchers contacted vendors in December 2019. Some of them might have implemented workarounds for the vulnerability\u2026 If your device was not updated after December 2019, it is likely still vulnerable.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.welivesecurity.com\/2020\/05\/19\/bluetooth-flaw-exposes-countless-devices-bias-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read more<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-3\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"new-spectra-attack-breaks-the-separation-between-wifi-and-bluetooth\"><strong>New Spectra attack breaks the separation between Wi-Fi and Bluetooth<\/strong><\/h2>\n\n\n<p>Speaking about Bluetooth\u2026<\/p>\n\n\n\n<p>Academics from Germany and Italy say they developed a new practical attack that breaks the separation between Wi-Fi and Bluetooth technologies running on the same device, such as laptops, smartphones, and tablets.<\/p>\n\n\n\n<p>Called Spectra, this attack works against &#8222;combo chips,&#8221; specialized chips that handle multiple types of radio wave-based wireless communications, such as Wi-Fi, Bluetooth, LTE, and others.<\/p>\n\n\n\n<p>More particularly, the Spectra attack takes advantage of the coexistence mechanisms that chipset vendors include with their devices. Combo chips use these mechanisms to switch between wireless technologies at a rapid pace. Researchers say that while these coexistence mechanisms increase performance, they also provide the opportunity to carry out side-channel attacks and allow an attacker to infer details from other wireless technologies the combo chip supports.<\/p>\n\n\n\n<p>The researchers analyzed Broadcom and Cypress combo chip which are in hundreds of millions of devices, such as all iPhones, MacBooks, and the Samsung Galaxy S series.&nbsp;<\/p>\n\n\n\n<p>Exploiting Spectra requires attacking a combo chip with malformed wireless traffic, and then attacking the chip interface between the two technologies.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.zdnet.com\/article\/new-spectra-attack-breaks-the-separation-between-wi-fi-and-bluetooth\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read more<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-4\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"there-was-a-data-leak-again-but-this-time-the-victim-is-a-malicious-actor-a-ghostdns-operator\"><strong>There was a data leak\u2026 again. But this time the victim is a malicious actor, a GhostDNS operator<\/strong><\/h2>\n\n\n<p>GhostDNS is a router exploit kit that uses cross-site request forgery (CSRF) requests to change the DNS settings and send users to phishing pages to steal their login credentials.<\/p>\n\n\n\n<p>How exactly the malware package fell into the \u201cwrong\u201d hands? A year ago in May 2019, the Avast Web Shield blocked a URL from the file-sharing platform sendspace.com. It turned out that some Avast user was up to no good, uploading a RAR archive with malicious content to the server. The user forgot to disable the Avast Web Shield while doing this, and since the archive was not password protected, it was automatically analyzed by the Shield and it triggered our router exploit kit (EK) detections. What happened next? AVAST security team downloaded the linked file and found the complete source code of the GhostDNS exploit kit.<\/p>\n\n\n\n<p>While analysing the archive researcher discovered two methods for attacking routers, Router EK and BRUT. Router EK attacks from the local network and requires the user to click on a malicious link. When the user clicks on the link, a search for the router\u2019s internal IP address begins. BRUT is a mass scanner that looks for routers exposed on the public internet and attacks them &#8211;&nbsp; the malware relies on brute-force attack. After gaining access to the target device, the malware changes the DNS settings so they point to the attacker\u2019s servers.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ghostdns-exploit-kit-source-code-leaked-to-antivirus-company\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read more<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-5\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"shiny-new-azure-login-attracts-new-shiny-phishing-attacks\"><strong>Shiny new Azure login attracts new shiny phishing attacks<\/strong><\/h2>\n\n\n<p>Admins working with Microsoft Azure beware: phishers are updating their assets to reflect changes on the company\u2019s cloud-based login screen.<\/p>\n\n\n\n<p>Microsoft announced the innocuous change to its Azure AD login screen on 26 February, rolling it out in the first week of April. The previous screen featured a login box against a full-frame photograph in the background. In the new version, Microsoft replaced the photograph with plain colours, reducing its size by 99%. That\u2019ll save network bandwidth and reduce page loading times, said executives at the time. Even though users may cache static page assets locally, they\u2019ll still reload them eventually, and every little helps.<\/p>\n\n\n\n<p>Online ne\u2019er-do-wells work quickly, though, and it didn\u2019t take long for phishing scammers to catch on. The company said in a tweet that it had seen multiple sites using the new background in a bid to lure Azure AD users into giving up their account info.<\/p>\n\n\n\n<p>Azure AD is the cloud-based version of the on-premises Active Directory system that holds user authentication and access privilege data. The cloud version is the single sign-on gateway to a range of online applications, including Microsoft\u2019s own cloud services, along with third party apps. As such, it\u2019s the holy grail for phishing scammers who could gain access to lots of enterprise accounts in the cloud if they mount a convincing attack.<\/p>\n\n\n\n<p><a href=\"https:\/\/nakedsecurity.sophos.com\/2020\/05\/18\/shiny-new-azure-login-attracts-shiny-new-phishing-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read more<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-6\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"do-you-have-thirst-for-knowledge-there-is-ten-more-cybersecurity-stories-below\"><strong>Do you have thirst for knowledge? There is ten more cybersecurity stories below<\/strong><\/h2>\n\n\n<p>1. Hackers infect multiple game developers with advanced malware (<a href=\"https:\/\/arstechnica.com\/information-technology\/2020\/05\/hackers-infect-multiple-game-developers-with-advanced-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">arsTECHNICA<\/a>)<br>2. NXNSAttack technique can be abused for large-scale DDoS attacks (<a href=\"https:\/\/www.zdnet.com\/article\/nxnsattack-technique-can-be-abused-for-large-scale-ddos-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">ZDNet<\/a>)<br>3. Researchers Divulge Details on Five Windows Zero Days (<a href=\"https:\/\/www.securityweek.com\/researchers-divulge-details-five-windows-zero-days\" target=\"_blank\" rel=\"noreferrer noopener\">Security Week<\/a>)<br>4. European supercomputers hacked to mine cryptocurrency (<a href=\"https:\/\/www.welivesecurity.com\/2020\/05\/18\/european-supercomputers-hacked-mine-cryptocurrency\/\" target=\"_blank\" rel=\"noreferrer noopener\">We live security<\/a>)<br>5. The ProLock ransomware doesn\u2019t tell you one important thing about decrypting your files (<a href=\"https:\/\/www.grahamcluley.com\/prolock-ransomware-decryption\/\" target=\"_blank\" rel=\"noreferrer noopener\">Graham Cluley<\/a>)<br>6.The dark web is flooded with offers to purchase corporate network access (<a href=\"https:\/\/www.helpnetsecurity.com\/2020\/05\/22\/access-dark-web\/\" target=\"_blank\" rel=\"noreferrer noopener\">Help Net Security<\/a>)<br>7. NetWalker ransomware gang hunts top-notch affiliates (<a href=\"https:\/\/threatpost.com\/netwalker-ransomware-gang-top-notch-affiliates\/155946\/\" target=\"_blank\" rel=\"noreferrer noopener\">ThreatPost<\/a>)<br>8. Microsoft warns of \u2018massive\u2019 phishing attack pushing legit RAT (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-warns-of-massive-phishing-attack-pushing-legit-rat\/\" target=\"_blank\" rel=\"noreferrer noopener\">BleepingComputer<\/a>)<br>9. EasyJet hacked: data breach affects 9 million customers (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/easyjet-hacked-data-breach-affects-9-million-customers\/\" target=\"_blank\" rel=\"noreferrer noopener\">BleepingComputer<\/a>)<br>10. The wolf is back\u2026(<a href=\"https:\/\/blog.talosintelligence.com\/2020\/05\/the-wolf-is-back.html\" target=\"_blank\" rel=\"noreferrer noopener\">Talos Intelligence<\/a>)<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the next episode of the\u00a0Xopero Security Center! There is a curious case of\u2026 RagnarLocker ransomware. Its operators are running Oracle VirtualBox to hide its presence on infected computers inside a VM. Does it do the trick? Are they successful? Check below.<\/p>\n","protected":false},"author":1,"featured_media":2447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[470],"tags":[],"class_list":["post-2614","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersec-news","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>RagnarLocker can hide its presence in a very neat way - Xopero Blog<\/title>\n<meta name=\"description\" content=\"There is a curious case of\u2026 RagnarLocker ransomware. Its operators are running Oracle VirtualBox to hide its presence on infected computers inside a VM...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/en\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RagnarLocker can hide its presence in a very neat way - Xopero Blog\" \/>\n<meta property=\"og:description\" content=\"There is a curious case of\u2026 RagnarLocker ransomware. Its operators are running Oracle VirtualBox to hide its presence on infected computers inside a VM...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/en\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-25T05:24:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-25T05:24:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1843\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"RagnarLocker can hide its presence in a very neat way\",\"datePublished\":\"2020-05-25T05:24:14+00:00\",\"dateModified\":\"2020-05-25T05:24:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\\\/\"},\"wordCount\":1291,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"articleSection\":[\"Cybersec news\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\\\/\",\"name\":\"RagnarLocker can hide its presence in a very neat way - Xopero Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"datePublished\":\"2020-05-25T05:24:14+00:00\",\"dateModified\":\"2020-05-25T05:24:16+00:00\",\"description\":\"There is a curious case of\u2026 RagnarLocker ransomware. Its operators are running Oracle VirtualBox to hide its presence on infected computers inside a VM...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"width\":1843,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"RagnarLocker can hide its presence in a very neat way\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"RagnarLocker can hide its presence in a very neat way - Xopero Blog","description":"There is a curious case of\u2026 RagnarLocker ransomware. Its operators are running Oracle VirtualBox to hide its presence on infected computers inside a VM...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/en\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\/","og_locale":"pl_PL","og_type":"article","og_title":"RagnarLocker can hide its presence in a very neat way - Xopero Blog","og_description":"There is a curious case of\u2026 RagnarLocker ransomware. Its operators are running Oracle VirtualBox to hide its presence on infected computers inside a VM...","og_url":"https:\/\/xopero.com\/blog\/en\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2020-05-25T05:24:14+00:00","article_modified_time":"2020-05-25T05:24:16+00:00","og_image":[{"width":1843,"height":481,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","type":"image\/png"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"6 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/en\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/en\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"RagnarLocker can hide its presence in a very neat way","datePublished":"2020-05-25T05:24:14+00:00","dateModified":"2020-05-25T05:24:16+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\/"},"wordCount":1291,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","articleSection":["Cybersec news"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/en\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\/","url":"https:\/\/xopero.com\/blog\/en\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\/","name":"RagnarLocker can hide its presence in a very neat way - Xopero Blog","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","datePublished":"2020-05-25T05:24:14+00:00","dateModified":"2020-05-25T05:24:16+00:00","description":"There is a curious case of\u2026 RagnarLocker ransomware. Its operators are running Oracle VirtualBox to hide its presence on infected computers inside a VM...","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/en\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/en\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/en\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","width":1843,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/en\/ragnarlocker-can-hide-its-presence-in-a-very-neat-way\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"RagnarLocker can hide its presence in a very neat way"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/2614","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=2614"}],"version-history":[{"count":4,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/2614\/revisions"}],"predecessor-version":[{"id":2622,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/2614\/revisions\/2622"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/2447"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=2614"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=2614"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=2614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}