Conti ransomware looks for and executes DLLs in its current directory. Therefore, we can potentially hijack a DLL to execute our own code to control and terminate the malware pre-encryption. The exploit dll will check if the current directory is “C:WindowsSystem32”. If not, we grab our process ID and terminate. We do not need to […]
REvil ransomware looks for and executes DLLs in its current directory. Therefore, we can potentially hijack a DLL to execute our own code in order to control and terminate the malware pre-encryption. The exploit dll will check if the current directory is “C:WindowsSystem32” and if not we grab our process ID and terminate. We do […]
WannaCry ransomware looks for and executes DLLs in its current directory. Therefore, we can hijack a DLL to execute our own code in order to control and terminate the malware pre-encryption. The exploit DLL checks if the current directory is “C:WindowsSystem32” and if not we grab our process ID and terminate. We do not need […]
https://ict.amnat-ed.go.th/readmee.htm notified by AnonCoders
Tags:
defacement
https://e-office.amnat-ed.go.th/readmee.htm notified by AnonCoders
Tags:
defacement
https://e-news.amnat-ed.go.th/readmee.htm notified by AnonCoders
Tags:
defacement
https://e-network.amnat-ed.go.th/readmee.htm notified by AnonCoders
Tags:
defacement
https://salary.amnat-ed.go.th/readmee.htm notified by AnonCoders
Tags:
defacement
http://cmarea3.go.th/readmee.htm notified by AnonCoders
Tags:
defacement
http://loei3.go.th/readme.txt notified by AnonCoders
Tags:
defacement