BERNHULLAUERIN ESLA

1234567891011121314151617181920
Across
  1. 2. All your files are encrypted by LockBit. For more information see Restore-My-Files.txt that is … in every encrypted folder.
  2. 6. Software designed by criminals to prevent computer users from getting access to their systems or data unless they pay money.
  3. 7. Usually, an object shot at during shooting practice. Here, potential organizations that hold valuable data from which attackers can make big payouts if infected by a ransomware.
  4. 9. What the program executable that encrypted the files on the machine was disguised in.
  5. 11. The action performed by the key you obtain you have paid the ransom.
  6. 13. Part of the name before .onion of the link you have to open to get your files back.
  7. 17. The second word of this protocol that uses tables to match IP addresses with Mac addresses.
  8. 18. To copy or move programs or information into a computer's memory, especially from the internet or a larger computer. Exactly what LockBit does with its victim’s data to threaten organizations in publishing them if they don’t pat the ransom.
  9. 19. One of the countries in which LockBit is commonly present.
  10. 20. The name of the Ransomware this paper is about.
Down
  1. 1. An anonymized instant messaging service used by the LockBit helpdesk to help organizations in rebuilding their locked-up network.
  2. 3. A technique used by LockBit to gain privileges in order to bypass the User Account Control.
  3. 4. If the organization hit by LockBit had a recent one, it wouldn’t have to pay the ransom.
  4. 5. What any password shouldn’t be to prevent LockBit ransomware attack, for example.
  5. 8. Four times as big or as much, which is the increase of ransomware detections last year.
  6. 10. English acronym of the European Regulation on data protection. You can find it in the Ransomware note.
  7. 12. Name of the scripting language that uses LockBit to spread over the network (Windows® specific).
  8. 14. Patrick van Looy is a specialist of this profession.
  9. 15. Name of another feared ransomware package.
  10. 16. Quiet and careful in order to attack without being seen or heard. What LockBit needs to stay, in order to not be detected by antiviruses.