ESALLockBit

1234567891011121314151617181920
Across
  1. 2. All your files are encrypted by LockBit. For more information see Restore-My-Files.txt that is … in every encrypted folder
  2. 4. The name of the Ransomware this paper is about
  3. 6. If the organization hit by LockBit had a recent one, it wouldn’t have to pay the ransom
  4. 10. The second word of this protocol that uses tables to match IP addresses with Mac addresses
  5. 12. An anonymized instant messaging service used by the LockBit helpdesk to help organizations in rebuilding their locked-up network
  6. 13. English acronym of the Regulation in EU law on data protection. You can find it in the Ransomware note.
  7. 15. Part of the name before .onion of the link you have to open to get your files back
  8. 16. Usually, an object shot at during shooting practice. Here, potential organizations that hold valuable data from which attackers can make big payouts if infected by a ransomware.
  9. 18. What the program executable that encrypted the files on the machine was disguised in
  10. 19. One of the Countries in which LockBit is commonly existing
  11. 20. To copy or move programs or information into a computer's memory, especially from the internet or a larger computer. Exactly what LockBit does with its victim’s data to threaten organizations in publishing them if they don’t pat the ransom.
Down
  1. 1. Software designed by criminals to prevent computer users from getting access to their own computer system or files unless they pay money
  2. 3. A technique used by LockBit to gain privileges in order to bypass the User Account Control
  3. 5. Patrick van Looy is a specialist of this profession
  4. 7. Name of another feared ransomware package
  5. 8. Four times as big or as much, the increase of ransomware detections last year
  6. 9. Quiet and careful in order not to be seen or heard. What LockBit needs to stay in order to not be detected by antiviruses.
  7. 11. What the key you obtain after ransom payment is used for
  8. 14. Name of the scripting langage that uses LockBit to spread over the network (Windows® specific)
  9. 17. What any password shouldn’t be to prevent LockBit ransomware attack, for example