Across
- 2. All your files are encrypted by LockBit. For more information see Restore-My-Files.txt that is … in every encrypted folder.
- 6. Software designed by criminals to prevent computer users from getting access to their systems or data unless they pay money.
- 7. Usually, an object shot at during shooting practice. Here, potential organizations that hold valuable data from which attackers can make big payouts if infected by a ransomware.
- 9. What the program executable that encrypted the files on the machine was disguised in.
- 11. The action performed by the key you obtain you have paid the ransom.
- 13. Part of the name before .onion of the link you have to open to get your files back.
- 17. The second word of this protocol that uses tables to match IP addresses with Mac addresses.
- 18. To copy or move programs or information into a computer's memory, especially from the internet or a larger computer. Exactly what LockBit does with its victim’s data to threaten organizations in publishing them if they don’t pat the ransom.
- 19. One of the countries in which LockBit is commonly present.
- 20. The name of the Ransomware this paper is about.
Down
- 1. An anonymized instant messaging service used by the LockBit helpdesk to help organizations in rebuilding their locked-up network.
- 3. A technique used by LockBit to gain privileges in order to bypass the User Account Control.
- 4. If the organization hit by LockBit had a recent one, it wouldn’t have to pay the ransom.
- 5. What any password shouldn’t be to prevent LockBit ransomware attack, for example.
- 8. Four times as big or as much, which is the increase of ransomware detections last year.
- 10. English acronym of the European Regulation on data protection. You can find it in the Ransomware note.
- 12. Name of the scripting language that uses LockBit to spread over the network (Windows® specific).
- 14. Patrick van Looy is a specialist of this profession.
- 15. Name of another feared ransomware package.
- 16. Quiet and careful in order to attack without being seen or heard. What LockBit needs to stay, in order to not be detected by antiviruses.