BERNHULLAUERIN ESLA lockbit

1234567891011121314151617181920
Across
  1. 2. All your files are encrypted by LockBit. For more information see Restore-My-Files.txt that is … in every encrypted folder.
  2. 4. The name of the Ransomware this paper is about.
  3. 6. If the organization hit by LockBit had a recent one, it wouldn’t have to pay the ransom.
  4. 10. The second word of this protocol that uses tables to match IP addresses with Mac addresses.
  5. 12. An anonymized instant messaging service used by the LockBit helpdesk to help organizations in rebuilding their locked-up network.
  6. 13. English acronym of the European Regulation on data protection. You can find it in the Ransomware note.
  7. 15. Part of the name before .onion of the link you have to open to get your files back.
  8. 16. Usually, an object shot at during shooting practice. Here, potential organizations that hold valuable data from which attackers can make big payouts if infected by a ransomware.
  9. 18. What the program executable that encrypted the files on the machine was disguised in.
  10. 19. One of the countries in which LockBit is commonly present.
  11. 20. To copy or move programs or information into a computer's memory, especially from the internet or a larger computer. Exactly what LockBit does with its victim’s data to threaten organizations in publishing them if they don’t pay the ransom.
Down
  1. 1. Software designed by criminals to prevent computer users from getting access to their systems or data unless they pay money.
  2. 3. A technique used by LockBit to gain privileges in order to bypass the User Account Control.
  3. 5. Patrick van Looy is a specialist of this profession.
  4. 7. Name of another feared ransomware package.
  5. 8. Four times as big or as much, which is the increase of ransomware detections last year.
  6. 9. Quiet and careful in order to attack without being seen or heard. What LockBit needs to stay, in order to not be detected by antiviruses.
  7. 11. The action performed by the key you obtain when you have paid the ransom.
  8. 14. Name of the scripting language that uses LockBit to spread over the network (Windows® specific).
  9. 17. What any password shouldn’t be to prevent LockBit ransomware attack, for example.