Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Datablack Ransomware Mirrors Proton Traits

August 14, 2024
Reading Time: 2 mins read
in Alerts

Datablack is a newly discovered ransomware strain that has been observed in the wild, displaying characteristics similar to ransomware from the Proton malware family. Upon infecting a system, Datablack encrypts user files, appending the “.Datablack” extension to each renamed file. In addition to the encryption, the malware drops a ransom note on the victim’s machine, titled “#Recovery.txt.” This note instructs victims to reach out to the attackers via provided email addresses for further decryption instructions, indicating a typical ransom demand scenario.

The Datablack ransomware is particularly aggressive in its tactics, as it can delete volume shadow copies, making it more difficult for the victim to recover data through traditional means. Volume shadow copies are used by Windows to create backup copies of files, and their deletion significantly hampers data recovery efforts, leaving victims with fewer options to restore their files. Furthermore, the ransomware is capable of disabling automatic repair features during the system’s boot process, preventing the victim from using recovery tools or booting into safe modes that might help mitigate the damage.

The malware also exhibits advanced detection evasion capabilities. It is flagged by several security tools, with detection signatures that include behavioral-based detections like SONAR.SuspLaunch, which identifies suspicious launch behavior, as well as file-based detections like Trojan.Gen.MBT. Machine learning-based security tools, such as Heur.AdvML.A, also identify the threat by detecting its malicious behavior, providing multiple layers of protection against it. These detection techniques suggest that Datablack is specifically designed to evade traditional antivirus systems while also leveraging cutting-edge machine learning tools.

As the threat landscape evolves, it is clear that Datablack is part of a growing trend of increasingly sophisticated ransomware variants. Victims of Datablack are urged to remain cautious of unsolicited emails and avoid downloading attachments or clicking on suspicious links. As the ransomware targets individuals and organizations alike, cybersecurity experts recommend deploying robust protection measures, including regularly updated antivirus software, backup systems, and the use of strong authentication methods to minimize the risk of falling victim to such attacks.

 

Reference:

  • Datablack Ransomware Targets Users With Advanced Techniques

Tags: August 2024Cyber AlertsCyber Alerts 2024Cyber threatsDatablackMalwareRansomware
ADVERTISEMENT

Related Posts

Facebook Scams Target Seniors With Malware

Android Spyware Poses As Signal And Totok

October 3, 2025
Facebook Scams Target Seniors With Malware

Facebook Scams Target Seniors With Malware

October 3, 2025
Facebook Scams Target Seniors With Malware

Chrome Update Fixes 21 Security Flaws

October 3, 2025
Smishing targets routers in Belgium 2025

Smishing targets routers in Belgium 2025

October 2, 2025
Smishing targets routers in Belgium 2025

Outlook Bug Causes Repeated Crashes

October 2, 2025
Smishing targets routers in Belgium 2025

MatrixPDF Toolkit Turns PDFs Into Lures

October 2, 2025

Latest Alerts

Facebook Scams Target Seniors With Malware

Android Spyware Poses As Signal And Totok

Chrome Update Fixes 21 Security Flaws

Outlook Bug Causes Repeated Crashes

Smishing targets routers in Belgium 2025

MatrixPDF Toolkit Turns PDFs Into Lures

Subscribe to our newsletter

    Latest Incidents

    Hackers Target Oracle Apps For Extortion

    Hospital Cyberattack Leaks Patient Data

    UK Renault Dacia Customer Data Stolen

    Allianz Life July Breach Hits 1.5M

    Dealership Software Breach Hits 766k

    Suffolk Website Down After Cyber-Attack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial