Manoharan Mudaliar

Cyber Security Consultant

Ransomware Variant Pezi

A new ransomware variant spotted. PEZI

After analysis, it seems to be an updated version of Djvu and not possible to decrypt offline. The only way to decrypt is online.

Online ID. In most cases, the ransomware is able to connect to its command and control servers when it encrypts files. When this happens, the servers respond by generating random keys for each infected computer. Since each computer has its unique key, you can’t use a key from another computer to decrypt your files. Unfortunately, there is nothing that can be done to recover files for the current version.

Ransom note:

ATTENTION!

Don’t worry, you can return all your files!
All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you.
This software will decrypt all your encrypted files.
What guarantees you have?
You can send one of your encrypted file from your PC and we decrypt it for free.
But we can decrypt only 1 file for free. File must not contain valuable information.
You can get and look video overview decrypt tool:
https://we.tl/t-gSEEREZ5tS
Price of private key and decrypt software is $980.
Discount 50% available if you contact us first 72 hours, that’s price for you is $490.
Please note that you’ll never restore your data without payment.
Check your e-mail “Spam” or “Junk” folder if you don’t get answer more than 6 hours.

To get this software you need write on our e-mail:
helpmanager@mail.ch

Reserve e-mail address to contact us:
restoreadmin@firemail.cc

ransomnote_email: helpmanager@mail.ch

sample_extension: .pezi

sample_bytes: [0x4F203 – 0x4F229] 0x7B33364136393842392D443637432D344530372D424538322D3045433542313442344446357D

Cisco Releases Major Security Updates on Various Platform

Cisco Security Advisory team releases security updates that address a vulnerability in multiple products.

Summary

Most of the vulnerabilities in various products highlight that a remote attacker could exploit vulnerabilities to take control of the affected system.

Major Affected Software and Appliance

  • Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software OSPF Packets Processing Memory Leak Vulnerability[1]
  • Cisco ASA Appliance Software and Firepower Threat Defense Software IPv6 DNS Denial of Service Vulnerability[2]
  • Cisco ASA Software and Firepower Threat Defense Software Web Services Information Disclosure Vulnerability[3]
  • Cisco Adaptive Security Appliance Software Kerberos Authentication Bypass Vulnerability[4]
  • Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Path Traversal Vulnerability[5]
  • Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SSL/TLS Denial of Service Vulnerability[6]
  • Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Malformed OSPF Packets Processing Denial of Service Vulnerability[7]
  • Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Media Gateway Control Protocol Denial of Service Vulnerabilities[8]

Advisory

It is highly advised to review the Cisco Advisory for more information and apply the necessary steps.

For detailed information, please visit

  1. https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ospf-memleak-DHpsgfnv
  2. https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ipv6-67pA658k
  3. https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-info-disclose-9eJtycMB
  4. https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-asa-kerberos-bypass-96Gghe2sS
  5. https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-path-JE3azWw43
  6. https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssl-vpn-dos-qY7BHpjN
  7. https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ospf-dos-RhMQY8qx
  8. https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-mgcp-SUqB8VKH

Reference

https://tools.cisco.com/security/center/publicationListing.x
https://www.us-cert.gov/ncas/current-activity/2020/05/07/cisco-releases-security-updates-multiple-products

 

Google Chrome Releases Critical Updates

Summary

Google released Chrome version 81.0.4044.138 for Windows, Mac, and Linux. It addresses vulnerabilities that an attacker could exploit to take control of an affected system.

Risk Level: Medium

Solution

Recommend applying the necessary updates. Upgrade to version Google Chrome 81.0.4044.138 or later.

For detailed information, please visit:[1]

How to upgrade to the latest version[2]