{"id":3104,"date":"2020-08-31T12:02:50","date_gmt":"2020-08-31T10:02:50","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=3104"},"modified":"2024-05-15T11:29:34","modified_gmt":"2024-05-15T09:29:34","slug":"autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/en\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\/","title":{"rendered":"Autodesk 3ds Max exploit \/ Qbot gains new tricks \/ SunCrypt joins ransomware cartel"},"content":{"rendered":"\n<p>Welcome to the next episode of the&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/xopero.com\/blog\/en\/category\/security-center\/\" target=\"_blank\">Xopero Security Center<\/a>! Autodesk 3ds Max &#8211; a very popular software used by architects has a serious flaw. Recently, it was exploited by an advanced hackers-for-hire group.  The attack hit an architecture company involved in luxury real-estate projects worth billions of dollars. What more? <\/p>\n\n\n\n<!--more-->\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-1\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"attackers-use-unicode-and-html-to-help-malicious-phishing-emails-slip-past-detection-tools\"><strong>Attackers use Unicode and HTML to help malicious phishing emails slip past detection tools<\/strong><\/h2>\n\n\n<p>Cybercriminals have been spotted using HTML\/CSS and Unicode tricks to bypass tools meant to block malicious emails.<\/p>\n\n\n\n<p>It definitely looks like we are dealing with new phishing techniques. Some attackers rely on hidden text and zero-font attacks. They put invisible characters between the letters of an email. It doesn&#8217;t trigger email defenses with phrases like &#8222;password expired&#8221; or &#8222;Office 365.&#8221; While others\u2026<\/p>\n\n\n\n<p>&#8230;attackers use their knowledge of HTML\/CSS and Unicode to disguise phishing emails in a very smart way. One of the new techniques involves Unicode\u2019s &#8222;soft hyphen,&#8221; also known as &#8222;syllable hyphen&#8221;. In typesetting, this is used to tell the renderer where to safely break a line and insert a visible hyphen. The soft hyphen normally renders as invisible. If we scan the malicious email for phrases like &#8222;change your password,&#8221; there will be no results. Why? Because the attacker had written such phrases as &#8222;c-h-a-n-g-e- -y-o-u-r- -p-a-s-s-w-o-r-d-.&#8221; To a user, they appear as normal. Scanners aren&#8217;t configured to look for this type of content, so they may not raise any flags.<\/p>\n\n\n\n<p>Another great example. When the attacker typed &#8222;Office 365,&#8221; they used the HTML &lt;font&gt; to make it look like a logotype. People often register the text in phishing mails as a logo.<\/p>\n\n\n\n<p>Attackers also used the &#8222;display:none&#8221; setting, an element of CSS that tells a browser to render text as invisible. The phisher made the error of putting text they wanted the user to see within a span element, even though the CSS was written to render spans as hidden. Then the attacker used the invisible span trick to hide repeating text &#8222;40008&#8221; between words of the phrase &#8222;Password for user[@]example[.]com. The &#8222;40008&#8221; text could be another tactic to bypass the pattern-matching in security tools. If there is a random number generated for every email, there&#8217;s less of a chance tools will associate them with the same phishing kit.<\/p>\n\n\n\n<p><strong>Security problem.<\/strong> Defending users against the soft hyphen technique may be challenging.<\/p>\n\n\n\n<p>It&#8217;s in the attacker&#8217;s interest to use several unique Unicode characters. On the other hand the more Unicode characters a company adds to its security tool, the slower it will be&#8230; and it may not necessarily scale well.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/attackers-use-unicode-and-html-to-bypass-email-security-tools\/d\/d-id\/1338739\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-2\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"hackers-compromised-an-unnamed-architecture-firm-via-autodesk-3ds-max-exploit\"><strong>Hackers compromised an unnamed architecture firm via Autodesk 3ds Max exploit<\/strong><\/h2>\n\n\n<p>An advanced hackers-for-hire group has compromised computers of an architecture firm involved in luxury real-estate projects worth billions of US dollars. The victim is a recognized company working with luxury real-estate developers in the U.S., the U.K., Australia, and Oman. How? Architects are using Autodesk 3ds Max&#8230;<\/p>\n\n\n\n<p>Earlier this month, Autodesk warned that an exploit for the Autodesk 3ds Max &#8211; specifically MAXScript scripting utility exists in the form of a malicious plugin called &#8222;PhysXPluginMfx.&#8221; When loaded in Autodesk 3ds Max, the plugin can infect other MAX files, thus spreading to other users on the network.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/08\/3dsExpltAttckFlw-1.png\" alt=\"\" class=\"wp-image-3105\" width=\"453\" height=\"369\" srcset=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/08\/3dsExpltAttckFlw-1.png 906w, https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/08\/3dsExpltAttckFlw-1-300x244.png 300w, https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/08\/3dsExpltAttckFlw-1-768x626.png 768w\" sizes=\"(max-width: 453px) 100vw, 453px\" \/><figcaption>Source: <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-for-hire-attack-architecture-firm-via-3ds-max-exploit\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Bleeping Computer<\/a><\/figcaption><\/figure><\/div>\n\n\n\n<p>The way that the attack has been carried on shows that the cybercriminals had prior knowledge of the company\u2019s security systems and used software applications. Hackers were carefully planning the attack to infiltrate the company and exfiltrate data undetected.<\/p>\n\n\n\n<p>The malware used during this attack collected details about the compromised host. Such as computer name, username, extracted passwords, and history data from Google Chrome. Malware also has been stealing files with specific extensions.<\/p>\n\n\n\n<p>To remain undetected, hackers used an interesting trick. It made the malicious binary sit dormant if Task Manager or Performance Monitor were running. Depending on how much window area was visible for these two applications, a flag was set to instruct the malware to sleep. Thus reducing CPU usage and placing it lower in the list of power-hungry processes. They also employed compression only for some files. Data that would attract unnecessary attention if archived, have been skipped.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-for-hire-attack-architecture-firm-via-3ds-max-exploit\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-3\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"after-a-decade-qbot-trojan-malware-gains-new-dangerous-tricks\"><strong>After a decade, Qbot Trojan malware gains new, dangerous tricks<\/strong><\/h2>\n\n\n<p>The Qbot Trojan (also known as Qakbot or Pinkslipbot) has been plaguing users and businesses for over a decade (!) Still coming up with new tricks that make it one of the most prevalent and successful malware threats. It is estimated to have claimed at least 100,000 victims across the world.&nbsp;<\/p>\n\n\n\n<p>Cybersecurity researchers from Check Point published research on the new trend. According to this, Outlook users are susceptible to a module designed to collect and compromise email threads on infected machines.&nbsp;<\/p>\n\n\n\n<p>A new variant of QBot is being deployed as a malicious payload by operators of the Emotet Trojan. The researchers estimate that one particularly extensive campaign in July impacted roughly 5% of organizations worldwide.<\/p>\n\n\n\n<p>The malware lands on a vulnerable machine via phishing documents containing URLs to .ZIP files that serve VBS content, calling the payload from one of six hardcoded encrypted URLs.&nbsp;<\/p>\n\n\n\n<p>Once a PC has been infected, a new and interesting module in the modern QBot variant described as an &#8222;email collector module&#8221; extracts all email threads and uploads them to the attacker&#8217;s C2 server.&nbsp;<\/p>\n\n\n\n<p>The hijacked threads are then used to propagate the malware further. By jumping on legitimate threads, unwitting readers might think messages sent by the attackers are legitimate&#8230; And therefore, are more likely to click on infected attachments.&nbsp;<\/p>\n\n\n\n<p>Subjects tracked by the team include tax payment reminders, job recruitment content, and COVID-19-related messages.&nbsp;<\/p>\n\n\n\n<p>QBot is able to steal browsing data, email records, and banking credentials. One of the Trojan&#8217;s modules downloads Mimikatz to harvest passwords. It is also able to perform browser web injections and install malicious payloads including ransomware ProLock. Besides, QBot connects infected machines as slave nodes in a wider botnet.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.zdnet.com\/article\/your-email-threads-are-now-being-hijacked-by-qbot-trojan\/#ftag=RSSbaffb68\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/xopero.com\/products\/xopero-backup-restore\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" src=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/06\/xbr-baner-en.jpg\" alt=\"The best backup and disaster recovery solution - try it for free up to 30 days \" class=\"wp-image-2705\" width=\"400\" height=\"275\" srcset=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/06\/xbr-baner-en.jpg 580w, https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/06\/xbr-baner-en-300x207.jpg 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/a><\/figure><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-4\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"suncrypt-ransomware-sheds-light-on-the-maze-ransomware-cartel\"><strong>SunCrypt Ransomware sheds light on the Maze ransomware cartel<\/strong><\/h2>\n\n\n<p>In June, we unveiled that the <a href=\"https:\/\/xopero.com\/blog\/en\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\/#paragraph-5\" target=\"_blank\" rel=\"noreferrer noopener\">Maze threat actors created a cartel of ransomware<\/a> operations. The main aim was to share information and techniques to help each other extort their victims.\u00a0<\/p>\n\n\n\n<p>When first started, this cartel included Maze and LockBit, but soon expanded to include Ragnar Locker. Now, SunCrypt Ransomware joins this big criminal team.<\/p>\n\n\n\n<p>This ransomware family began operating in October 2019, but was not very active. It may change &#8211; now as SunCrypt operators say they have &#8222;two-way communication channels&#8221;.<\/p>\n\n\n\n<p><strong>How does the cartel work and earn?<\/strong> It is still pretty mysterious but sharing revenue from the successful operation sounds very promising as more and more operators want to have a slice of the cake. Based on SunCrypt operators&#8217; statement they were brought in because&#8230; Maze can&#8217;t handle all of the potential attacks. So they provide compromised network access to cartel members in exchange for a revenue share.<\/p>\n\n\n\n<p>For months, Maze has been hosting a data leak site and launching attacks from known public IP addresses. Yet in all this time, their services remain intact and have not been taken down by law enforcement.<\/p>\n\n\n\n<p><strong>The SunCrypt ransomware in short. <\/strong>The ransomware is currently being distributed as a DLL that, when executed, will encrypt a computer&#8217;s files. Then it will append a hexadecimal hash to the end of each file name. It is not known what this hash represents.<\/p>\n\n\n\n<p>In every folder, a ransom note named YOUR_FILES_ARE_ENCRYPTED.HTML is created. It contains information on what happened to a victim&#8217;s files and a link to the Tor payment site. The Tor link enclosed in a ransom note is hardcoded into the ransomware executable. This means that every victim encrypted by a particular SunCrypt executable will have the same Tor payment site link.&nbsp;<\/p>\n\n\n\n<p>The Tor payment site does not have automated features.  It simply contains a chat screen where a victim can negotiate a ransom with the SunCrypt threat actors. Furthermore, every ransom note contains a link to the SunCrypt data leak site that the threat actors warn will be used to publish the victim&#8217;s data.<\/p>\n\n\n\n<p>SunCrypt is currently being analyzed for weaknesses.  It is not known if it is possible to recover files for free.<\/p>\n\n\n\n<p>Please be advised that the best protection against ransomware and its effects is to invest in proven antivirus solutions and <a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/xopero.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">backup and disaster recovery software<\/a>.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/suncrypt-ransomware-sheds-light-on-the-maze-ransomware-cartel\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-5\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"do-you-have-thirst-for-knowledge-there-is-ten-more-cybersecurity-stories-below\">Do you have thirst for knowledge? There is ten more cybersecurity stories below<\/h2>\n\n\n<p>1. New AI algorithm to detect cryptocurrency miners as they steal power (<a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/www.helpnetsecurity.com\/2020\/08\/26\/ai-algorithm-detect-cryptocurrency-miners\" target=\"_blank\" rel=\"noreferrer noopener\">HelpNetSecurity<\/a>)<br>2. Phishing Attack Used Box to Land in Victim Inboxes (<a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/www.darkreading.com\/attacks-breaches\/phishing-attack-used-box-to-land-in-victim-inboxes\/d\/d-id\/1338754\" target=\"_blank\" rel=\"noreferrer noopener\">Dark Reading<\/a>)<br>3. Cisco Patches \u2018High-Severity\u2019 Bugs Impacting Switches, Fibre Storage (<a href=\"https:\/\/threatpost.com\/cisco-high-severity-bugs-impact-switches-fibre-storage\/158691\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Threat Post<\/a>)<br>4. A quarter of the Alexa Top 10K websites are using browser fingerprinting scripts (<a href=\"https:\/\/www.zdnet.com\/article\/a-quarter-of-the-alexa-top-10k-websites-are-using-browser-fingerprinting-scripts\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">ZDNet<\/a>)<br>5. From zero to hero: Zero2Automated malware reverse engineering course (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/from-zero-to-hero-zero2automated-malware-reverse-engineering-course\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Bleeping Computer<\/a>)<br>6. New Zealand stock exchange halted trading after DDoS attacks (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-zealand-stock-exchange-halted-trading-after-ddos-attacks\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Bleeping Computer<\/a>)<br>7. Giveaway Scam Infects 65,000 Devices with Malware (<a href=\"https:\/\/www.infosecurity-magazine.com\/news\/giveaway-scam-infects-65k-devices\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Infosecurity Magazine<\/a>)<br>8. Lemon_Duck cryptominer malware now targets Linux devices (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/lemon-duck-cryptominer-malware-now-targets-linux-devices\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Bleeping Computer<\/a>)<br>9. 350 million decrypted email addresses left exposed on an unsecured server (<a href=\"https:\/\/securityaffairs.co\/wordpress\/107604\/data-breach\/email-addresses-data-leak.html?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=email-addresses-data-leak\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Security Affairs<\/a>)<br>10. UltraRank hackers steal credit cards from hundreds of stores (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ultrarank-hackers-steal-credit-cards-from-hundreds-of-stores\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Bleeping Computer<\/a>)<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the next episode of the&nbsp;Xopero Security Center! Autodesk 3ds Max &#8211; a very popular software used by architects has a serious flaw. Recently, it was exploited by an advanced hackers-for-hire group. The attack hit an architecture company involved in luxury real-estate projects worth billions of dollars. What more?<\/p>\n","protected":false},"author":1,"featured_media":2447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[470],"tags":[],"class_list":["post-3104","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersec-news","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Autodesk 3ds Max exploit \/ Qbot gains new tricks \/ SunCrypt joins ransomware cartel - Xopero Blog<\/title>\n<meta name=\"description\" content=\"Autodesk 3ds Max - a very popular software used by architects has a serious flaw. Recently, it was exploited by an advanced hackers-for-hire group in attack\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/en\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Autodesk 3ds Max exploit \/ Qbot gains new tricks \/ SunCrypt joins ransomware cartel - Xopero Blog\" \/>\n<meta property=\"og:description\" content=\"Autodesk 3ds Max - a very popular software used by architects has a serious flaw. Recently, it was exploited by an advanced hackers-for-hire group in attack\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/en\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-31T10:02:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-15T09:29:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1843\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"Autodesk 3ds Max exploit \\\/ Qbot gains new tricks \\\/ SunCrypt joins ransomware cartel\",\"datePublished\":\"2020-08-31T10:02:50+00:00\",\"dateModified\":\"2024-05-15T09:29:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\\\/\"},\"wordCount\":1534,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"articleSection\":[\"Cybersec news\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\\\/\",\"name\":\"Autodesk 3ds Max exploit \\\/ Qbot gains new tricks \\\/ SunCrypt joins ransomware cartel - Xopero Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"datePublished\":\"2020-08-31T10:02:50+00:00\",\"dateModified\":\"2024-05-15T09:29:34+00:00\",\"description\":\"Autodesk 3ds Max - a very popular software used by architects has a serious flaw. Recently, it was exploited by an advanced hackers-for-hire group in attack\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"width\":1843,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Autodesk 3ds Max exploit \\\/ Qbot gains new tricks \\\/ SunCrypt joins ransomware cartel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Autodesk 3ds Max exploit \/ Qbot gains new tricks \/ SunCrypt joins ransomware cartel - Xopero Blog","description":"Autodesk 3ds Max - a very popular software used by architects has a serious flaw. Recently, it was exploited by an advanced hackers-for-hire group in attack","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/en\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\/","og_locale":"pl_PL","og_type":"article","og_title":"Autodesk 3ds Max exploit \/ Qbot gains new tricks \/ SunCrypt joins ransomware cartel - Xopero Blog","og_description":"Autodesk 3ds Max - a very popular software used by architects has a serious flaw. Recently, it was exploited by an advanced hackers-for-hire group in attack","og_url":"https:\/\/xopero.com\/blog\/en\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2020-08-31T10:02:50+00:00","article_modified_time":"2024-05-15T09:29:34+00:00","og_image":[{"width":1843,"height":481,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","type":"image\/png"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"8 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/en\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/en\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"Autodesk 3ds Max exploit \/ Qbot gains new tricks \/ SunCrypt joins ransomware cartel","datePublished":"2020-08-31T10:02:50+00:00","dateModified":"2024-05-15T09:29:34+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\/"},"wordCount":1534,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","articleSection":["Cybersec news"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/en\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\/","url":"https:\/\/xopero.com\/blog\/en\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\/","name":"Autodesk 3ds Max exploit \/ Qbot gains new tricks \/ SunCrypt joins ransomware cartel - Xopero Blog","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","datePublished":"2020-08-31T10:02:50+00:00","dateModified":"2024-05-15T09:29:34+00:00","description":"Autodesk 3ds Max - a very popular software used by architects has a serious flaw. Recently, it was exploited by an advanced hackers-for-hire group in attack","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/en\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/en\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/en\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","width":1843,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/en\/autodesk-3ds-max-exploit-qbot-gains-new-tricks-suncrypt-joins-ransomware-cartel\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"Autodesk 3ds Max exploit \/ Qbot gains new tricks \/ SunCrypt joins ransomware cartel"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3104","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=3104"}],"version-history":[{"count":3,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3104\/revisions"}],"predecessor-version":[{"id":5811,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3104\/revisions\/5811"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/2447"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=3104"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=3104"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=3104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}