{"id":3352,"date":"2020-11-09T08:27:29","date_gmt":"2020-11-09T07:27:29","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=3352"},"modified":"2020-11-09T09:07:36","modified_gmt":"2020-11-09T08:07:36","slug":"regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/en\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\/","title":{"rendered":"RegretLocker &#8211; this new ransomware can meddle with your virtual hard drives"},"content":{"rendered":"\n<p>Welcome to the next episode of the&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/xopero.com\/blog\/en\/category\/security-center\/\" target=\"_blank\">Xopero Security Center<\/a>! This time we shed some light on RegretLocker. This new ransomware is quite a sophisticated threat. It uses advanced techniques to compromise Windows virtual machines first, then encrypts virtual hard drives. How exactly? Check below. <\/p>\n\n\n\n<!--more-->\n\n\n\n<div style=\"height:45px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-1\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-last-regret-of-a-windows-user-has-a-new-name-regretlocker\"><strong>The last regret of a Windows user has a new name \u2013 RegretLocker<\/strong><\/h2>\n\n\n<p>A new ransomware called RegretLocker uses a variety of advanced features that allows it to encrypt virtual hard drives and close open files for encryption.<\/p>\n\n\n\n<p>RegretLocker is a simple ransomware in terms of appearance. When encrypting files, it will append the innocuous-sounding .mouse extension to encrypted file names. What it lacks in appearance, though, it makes up for in advanced features that we do not usually see in ransomware infections.<\/p>\n\n\n\n<p>When creating a Windows Hyper-V virtual machine, a virtual hard disk is created and stored in a VHD or VHDX file. These virtual hard disk files contain a raw disk image, including a drive&#8217;s partition table and partitions, and like regular disk drives, can range in size from a few gigabytes to terabytes.<\/p>\n\n\n\n<p>When a ransomware encrypts files on a computer, it is not efficient to encrypt a large file as it slows down the entire encryption process&#8217;s speed. RegretLocker uses an interesting technique of mounting a virtual disk file so each of its files can be encrypted individually. To do this, RegretLocker uses the Windows Virtual Storage API OpenVirtualDisk, AttachVirtualDisk, and GetVirtualDiskPhysicalPath functions to mount virtual disks. Once the virtual drive is mounted as a physical disk in Windows, the ransomware can encrypt each one individually, which increases the speed of encryption.<\/p>\n\n\n\n<p>In addition to using the Virtual Storage API, RegretLocker also utilizes the Windows Restart Manager API to terminate processes or Windows services that keep a file open during encryption. But if the name of a process contains 'vnc&#8217;, 'ssh&#8217;, 'mstsc&#8217;, 'System&#8217;, or 'svchost.exe&#8217;, the ransomware will not terminate it. This exception list is likely used to prevent the termination of critical programs or those used by the threat actor to access the compromised system.<\/p>\n\n\n\n<p>RegretLocker looks to be worth to keep an eye on.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-regretlocker-ransomware-targets-windows-virtual-machines\/\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:45px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-2\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"git-lfs-vulnerability-allows-attackers-to-compromise-targets-windows-systems\"><strong>Git LFS vulnerability allows attackers to compromise targets\u2019 Windows systems<\/strong><\/h2>\n\n\n<p>Git Large File Storage (Git LFS) is an open source Git extension for versioning large files. One with quite a large community too. Dawid Golunski a Security Research and founder of the ExploitBox discovered a serious vulnerability (CVE-2020-27955) which allows attackers to achieve remote code execution if the Windows-using victim is tricked into cloning the attacker\u2019s malicious repository &#8211; using a vulnerable Git version control tool.<\/p>\n\n\n\n<p>It can be exploited in a variety of popular Git clients in their default configuration \u2013 GitHub CLI, GitHub Desktop, SmartGit, SourceTree, GitKraken, Visual Studio Code, etc. \u2013 and likely other clients\/development IDEs (i.e., those install git with the Git LFS extension by default).<\/p>\n\n\n\n<p>Git LFS does not specify a full path to git binary when executing a new git process via a specific exec.Command() function.<\/p>\n\n\n\n<p class=\"has-light-gray-background-color has-background\">\u201c<em>As the exec.Command() implementation on Windows systems include the current directory, attackers may be able to plant a backdoor in a malicious repository by simply adding an executable file named: git.bat, git.exe, git.cmd or any other extension that is used on the victim\u2019s system (PATHEXT environment dependent), in the main repo\u2019s directory. As a result, the malicious git binary planted in this way will get executed instead of the original git binary located in a trusted path.<\/em>\u201d &#8211; explains Dawid Golunski.<\/p>\n\n\n\n<p>The CVE-2020-27955 vulnerability is trivial to exploit. It can be triggered if the victim is tricked into cloning the attacker\u2019s malicious repository using a vulnerable Git version control tool.<\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/youtu.be\/tlptOf9w274\n<\/div><\/figure>\n\n\n\n<p>Affected users and product vendors are advised to update to the latest Git LFS version (<a href=\"https:\/\/github.com\/git-lfs\/git-lfs\/releases\/tag\/v2.12.1\" target=\"_blank\" rel=\"noreferrer noopener\">v2.12.1<\/a>), which plugged the security hole. Git for Windows has also been <a href=\"https:\/\/github.com\/git-for-windows\/git\/releases\/\" target=\"_blank\" rel=\"noreferrer noopener\">updated<\/a> to include this Git LFS version.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.helpnetsecurity.com\/2020\/11\/05\/cve-2020-27955\/\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:45px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-3\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"revil-ransomware-gang-acquires-kpot-malware\"><strong>REvil ransomware gang 'acquires&#8217; KPOT malware<\/strong><\/h2>\n\n\n<p>REvil ransomware gang have \u201cacquired\u201d the source code of the KPOT information stealer trojan for $6,500 on the underground auction. The sale took place after the KPOT malware author decided to auction off the code, desiring to move off to other projects.<\/p>\n\n\n\n<p>The sale was organized as a public auction on a private underground hacking forum for Russian-speaking cyber-criminals. The only bidder was UNKN, a well-known member of the REvil (Sodinokibi) ransomware gang, said security researcher Pancak3. UNKN paid the initial asking price of $6,500, while other forum members declined to participate, citing the steep asking price.<\/p>\n\n\n\n<p>Pancak3, who first spotted the KPOT auction in mid-October, told that he believes the REvil gang bought KPOT to &#8222;further develop it&#8221; and add it to its considerable arsenal of hacking tools the gang uses during its targeted intrusions inside corporate networks.<\/p>\n\n\n\n<p>First spotted in 2018, KPOT is a classic &#8222;information stealer&#8221; that can extract and steal passwords from various apps on infected computers. This includes web browsers, instant messengers, email clients, VPNs, RDP services, FTP apps, cryptocurrency wallets, and gaming software, according to a 2019 Proofpoint report.<\/p>\n\n\n\n<p>Although many other forum members have described the KPOT code as overpriced, UNKN and the REvil gang have money to spare. The member claimed in an interview that the REvil gang makes more than $100 million from ransom demands each year.&nbsp;<\/p>\n\n\n\n<p><a href=\"http:\/\/zdnet.com\/article\/revil-ransomware-gang-acquires-kpot-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:45px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-4\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"growdiaries-exposes-emails-passwords-of-14m-cannabis-growers\"><strong>GrowDiaries Exposes Emails, Passwords of 1.4M Cannabis Growers<\/strong><\/h2>\n\n\n<p>A database linked to GrowDiaries, an online community of cannabis growers, has exposed more than a million users\u2019 email addresses, passwords, IP address records and posts &#8211; all together, 3.4 million records. Many from countries where pot is illegal.<\/p>\n\n\n\n<p>GrowDiaries is a robust online community of cannabis growing enthusiasts from around the world, where they can share tips, tricks and pictures of their progress. On Oct. 10, researcher Volodymyr \u201cBob\u201d Diachenko found a database linked to GrowDiaries with 1.4 million email and IP address records, along with an additional 2 million user posts, left accessible online.&nbsp;<\/p>\n\n\n\n<p>These 2 million posts were protected by passwords, but Diachenco found GrowDiaries was using MD5 to hash out passwords, which is easily compromised and leaves members vulnerable to malicious actors, according to Diachenko.<\/p>\n\n\n\n<p>\u201cMany users appear to be from locations where growing and using marijuana is not legal,\u201d Diachenko wrote. \u201cThey could face legal repercussions or possibly extortion if their growing activities come to light.\u201d\u2019<\/p>\n\n\n\n<p>In Malaysia, selling drugs is punishable by death and a possession conviction in countries including Dubai, Singapore, The Philippines and many others, often comes with a lengthy prison stay.<\/p>\n\n\n\n<p>Diachenko said, GrowDiaries members should be on the lookout for phishing attacks and to update passwords across all platforms because the compromised credentials could be used in \u201cstuffing\u201d attacks, which he explains involves automated bots plugging in stolen passwords and usernames in various combinations in an attempt to breach other apps and sites.<\/p>\n\n\n\n<p>After reporting the vulnerability, GrowDiaries asked for additional details and by Oct. 15, the data had been secured.<\/p>\n\n\n\n<p><a href=\"https:\/\/threatpost.com\/growdiaries-emails-passwords-cannabis-growers\/160969\/\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:45px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-5\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"do-you-have-thirst-for-knowledge-there-is-ten-more-cybersecurity-stories-below\">Do you have thirst for knowledge? There is ten more cybersecurity stories below<\/h2>\n\n\n<p>1. Games in Microsoft Store Can Be Abused for Privilege Escalation on Windows (<a href=\"https:\/\/www.securityweek.com\/games-microsoft-store-can-be-abused-privilege-escalation-windows\" target=\"_blank\" rel=\"noreferrer noopener\">Security Week<\/a>)<br>2. Apple search bot leaked internal IPs via proxy configuration (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/apple-search-bot-leaked-internal-ips-via-proxy-configuration\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bleeping Computer<\/a>)<br>3. Malicious npm package opens backdoors on programmers&#8217; computers (<a href=\"https:\/\/www.zdnet.com\/article\/malicious-npm-package-opens-backdoors-on-programmers-computers\" target=\"_blank\" rel=\"noreferrer noopener\">ZDNet<\/a>)<br>4. Mysterious APT Leaves Curious \u2018KilllSomeOne\u2019 Clue (<a href=\"https:\/\/threatpost.com\/apt-leaves-killlsomeone-clue\/160975\/\" target=\"_blank\" rel=\"noreferrer noopener\">ThreatPost<\/a>)<br>5. Zoom Snooping: How Body Language Can Spill Your Password (<a href=\"https:\/\/threatpost.com\/zoom-snooping-passwords\/161000\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Post<\/a>)<br>6. Multiple JavaScript vulnerabilities in Adobe Acrobat Reader (<a href=\"https:\/\/blog.talosintelligence.com\/2020\/11\/vulnerability-spotlight-multiple.html\" target=\"_blank\" rel=\"noreferrer noopener\">Tallos Intelligence<\/a>)<br>7. Containers for Data Analysis Are Rife With Vulnerabilities (<a href=\"https:\/\/www.darkreading.com\/application-security\/containers-for-data-analysis-are-rife-with-vulnerabilities\/d\/d-id\/1339372\" target=\"_blank\" rel=\"noreferrer noopener\">Dark Reading<\/a>)<br>8. Mattel Reveals July Ransomware Attack Impacting Business (<a href=\"https:\/\/www.infosecurity-magazine.com\/news\/mattel-reveals-july-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\">Infosecurity Magazine<\/a>)<br>9. Sneaky Office 365 phishing inverts images to evade detection (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/sneaky-office-365-phishing-inverts-images-to-evade-detection\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bleeping Computer<\/a>)<br>10. 23,600 hacked databases have leaked from a defunct 'data breach index&#8217; site (<a href=\"https:\/\/www.zdnet.com\/article\/23600-hacked-databases-have-leaked-from-a-defunct-data-breach-index-site\/\" target=\"_blank\" rel=\"noreferrer noopener\">ZDNet<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the next episode of the&nbsp;Xopero Security Center! This time we shed some light on RegretLocker. This new ransomware is quite a sophisticated threat. It uses advanced techniques to compromise Windows virtual machines first, then encrypts virtual hard drives. How exactly? Check below.<\/p>\n","protected":false},"author":1,"featured_media":2447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[470],"tags":[],"class_list":["post-3352","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersec-news","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>RegretLocker - this new ransomware can meddle with your virtual hard drives - Xopero Blog<\/title>\n<meta name=\"description\" content=\"This time we shed some light on RegretLocker. This new ransomware is quite a sophisticated threat. It uses advanced techniques to compromise Win...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/en\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RegretLocker - this new ransomware can meddle with your virtual hard drives - Xopero Blog\" \/>\n<meta property=\"og:description\" content=\"This time we shed some light on RegretLocker. This new ransomware is quite a sophisticated threat. It uses advanced techniques to compromise Win...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/en\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-09T07:27:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-09T08:07:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1843\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"RegretLocker &#8211; this new ransomware can meddle with your virtual hard drives\",\"datePublished\":\"2020-11-09T07:27:29+00:00\",\"dateModified\":\"2020-11-09T08:07:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\\\/\"},\"wordCount\":1281,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"articleSection\":[\"Cybersec news\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\\\/\",\"name\":\"RegretLocker - this new ransomware can meddle with your virtual hard drives - Xopero Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"datePublished\":\"2020-11-09T07:27:29+00:00\",\"dateModified\":\"2020-11-09T08:07:36+00:00\",\"description\":\"This time we shed some light on RegretLocker. This new ransomware is quite a sophisticated threat. It uses advanced techniques to compromise Win...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"width\":1843,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"RegretLocker &#8211; this new ransomware can meddle with your virtual hard drives\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"RegretLocker - this new ransomware can meddle with your virtual hard drives - Xopero Blog","description":"This time we shed some light on RegretLocker. This new ransomware is quite a sophisticated threat. It uses advanced techniques to compromise Win...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/en\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\/","og_locale":"pl_PL","og_type":"article","og_title":"RegretLocker - this new ransomware can meddle with your virtual hard drives - Xopero Blog","og_description":"This time we shed some light on RegretLocker. This new ransomware is quite a sophisticated threat. It uses advanced techniques to compromise Win...","og_url":"https:\/\/xopero.com\/blog\/en\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2020-11-09T07:27:29+00:00","article_modified_time":"2020-11-09T08:07:36+00:00","og_image":[{"width":1843,"height":481,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","type":"image\/png"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"6 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/en\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/en\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"RegretLocker &#8211; this new ransomware can meddle with your virtual hard drives","datePublished":"2020-11-09T07:27:29+00:00","dateModified":"2020-11-09T08:07:36+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\/"},"wordCount":1281,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","articleSection":["Cybersec news"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/en\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\/","url":"https:\/\/xopero.com\/blog\/en\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\/","name":"RegretLocker - this new ransomware can meddle with your virtual hard drives - Xopero Blog","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","datePublished":"2020-11-09T07:27:29+00:00","dateModified":"2020-11-09T08:07:36+00:00","description":"This time we shed some light on RegretLocker. This new ransomware is quite a sophisticated threat. It uses advanced techniques to compromise Win...","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/en\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/en\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/en\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","width":1843,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/en\/regretlocker-this-new-ransomware-can-meddle-with-your-virtual-hard-drives\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"RegretLocker &#8211; this new ransomware can meddle with your virtual hard drives"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3352","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=3352"}],"version-history":[{"count":7,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3352\/revisions"}],"predecessor-version":[{"id":3362,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3352\/revisions\/3362"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/2447"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=3352"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=3352"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=3352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}