Blog hero image

BeforeCrypt Blog

Latest posts

Knowledge
Sodinokibi Recruiting
Ransomware as a Service: Understanding the Sodinokibi Gang

[vc_row][vc_column][vc_cta h2=”Contact Our Ransomware & Cybersecurity Experts” h2_font_container=”tag:p|font_size:1.5em|text_align:left” h2_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” h4=”We will get back to you as quickly as possible!” h4_font_container=”tag:p|font_size:1.3em|text_align:left|color:rgba(157%2C157%2C158%2C0.89)” h4_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” style=”flat” css=”” use_custom_fonts_h2=”true” use_custom_fonts_h4=”true”]Get Help Now[/vc_cta][vc_column_text] As part of our work in ransomware removal and prevention, we conduct detailed investigations into the methods used by ransomware gangs. The Sodinokibi ransomware gang, also known as […]

24.02.2021
Knowledge
Mimikatz: How Hackers Use it to Spread Ransomware and How You Can Protect Yourself

[vc_row][vc_column][vc_cta h2=”Contact Our Ransomware & Cybersecurity Experts” h2_font_container=”tag:p|font_size:1.5em|text_align:left” h2_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” h4=”We will get back to you as quickly as possible!” h4_font_container=”tag:p|font_size:1.3em|text_align:left|color:rgba(157%2C157%2C158%2C0.89)” h4_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” style=”flat” css=”” use_custom_fonts_h2=”true” use_custom_fonts_h4=”true”]Get Help Now[/vc_cta][vc_column_text]Understanding the tools ransomware attackers use and how they work can be very helpful in protecting yourself against cyber intruders. The more you know about how hackers work, the […]

02.02.2021
Knowledge
Capitol Hill Riots Cybersecurity
Missing Laptops | Why Capital Riots are a Cybersecurity Disaster

[vc_row][vc_column][vc_cta h2=”Contact Our Ransomware & Cybersecurity Experts” h2_font_container=”tag:p|font_size:1.5em|text_align:left” h2_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” h4=”We will get back to you as quickly as possible!” h4_font_container=”tag:p|font_size:1.3em|text_align:left|color:rgba(157%2C157%2C158%2C0.89)” h4_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” style=”flat” css=”” use_custom_fonts_h2=”true” use_custom_fonts_h4=”true”]Get Help Now[/vc_cta][vc_column_text]Wednesday, 6th January 2021 will be considered one of the darkest days in US history when the epicenter of democracy, Capitol Hill was rushed by an angry mob of […]

10.01.2021
Knowledge
Crypt FUD
What does Crypt and FUD Mean for Your Security

[vc_row][vc_column][vc_cta h2=”Contact Our Ransomware & Cybersecurity Experts” h2_font_container=”tag:p|font_size:1.5em|text_align:left” h2_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” h4=”We will get back to you as quickly as possible!” h4_font_container=”tag:p|font_size:1.3em|text_align:left|color:rgba(157%2C157%2C158%2C0.89)” h4_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” style=”flat” css=”” use_custom_fonts_h2=”true” use_custom_fonts_h4=”true”]Get Help Now[/vc_cta][vc_column_text]Cybersecurity threats are becoming too sophisticated and rampant to keep up with. Most IT departments in both small and large companies are constantly faced with emerging threats on an […]

06.01.2021
Knowledge
Spearphishing Big Game Hunting Versus Widenet RDP Attacks

[vc_row][vc_column][vc_cta h2=”Contact Our Ransomware & Cybersecurity Experts” h2_font_container=”tag:p|font_size:1.5em|text_align:left” h2_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” h4=”We will get back to you as quickly as possible!” h4_font_container=”tag:p|font_size:1.3em|text_align:left|color:rgba(157%2C157%2C158%2C0.89)” h4_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” style=”flat” css=”” use_custom_fonts_h2=”true” use_custom_fonts_h4=”true”]Get Help Now[/vc_cta][vc_column_text]Hackers and cybercriminals have been turning their attention to big-game hunting, which basically refers to targeting bigger and more secure businesses where they can demand larger ransoms. Big game […]

05.01.2021
Knowledge
Ransomware Attacks in 2020
Top 10 Biggest Data Breaches and Ransomware Incidents in 2020

[vc_row][vc_column][vc_cta h2=”Contact Our Ransomware & Cybersecurity Experts” h2_font_container=”tag:p|font_size:1.5em|text_align:left” h2_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” h4=”We will get back to you as quickly as possible!” h4_font_container=”tag:p|font_size:1.3em|text_align:left|color:rgba(157%2C157%2C158%2C0.89)” h4_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” style=”flat” css=”” use_custom_fonts_h2=”true” use_custom_fonts_h4=”true”]Get Help Now[/vc_cta][vc_column_text]2020 was no exceptional year, filled with uncertainties. We saw a global pandemic COVID19 wreaking havoc on earth. We witnessed the biggest surge in cybersecurity attacks ever seen. We […]

31.12.2020
Knowledge
cobalt strike beacon
How Ransomware Hackers can use Cobalt Strike to Stage an Attack

[vc_row][vc_column][vc_cta h2=”Contact Our Ransomware & Cybersecurity Experts” h2_font_container=”tag:p|font_size:1.5em|text_align:left” h2_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” h4=”We will get back to you as quickly as possible!” h4_font_container=”tag:p|font_size:1.3em|text_align:left|color:rgba(157%2C157%2C158%2C0.89)” h4_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” style=”flat” css=”” use_custom_fonts_h2=”true” use_custom_fonts_h4=”true”]Get Help Now[/vc_cta][vc_column_text]Cobalt Strike is an important tool in the cybersecurity arena. It’s an intensive commercial penetration testing toolkit used for different levels of intrusion. Cobalt Strike gives your pen-testers access […]

28.12.2020
Knowledge
Drive by Downloads
Drive-by Downloads are not a Thing of the Past – Here’s why

[vc_row][vc_column][vc_cta h2=”Contact Our Ransomware & Cybersecurity Experts” h2_font_container=”tag:p|font_size:1.5em|text_align:left” h2_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” h4=”We will get back to you as quickly as possible!” h4_font_container=”tag:p|font_size:1.3em|text_align:left|color:rgba(157%2C157%2C158%2C0.89)” h4_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” style=”flat” css=”” use_custom_fonts_h2=”true” use_custom_fonts_h4=”true”]Get Help Now[/vc_cta][vc_column_text]If you thought drive-by downloads are a thing of the past, you may be surprised by the increasing number of these attacks in 2020. Drive-by downloads have become a […]

21.12.2020
Knowledge
Ransomware and Gmail
How Can Ransomware Attacks Happen Through Gmail?

[vc_row][vc_column][vc_cta h2=”Contact Our Ransomware & Cybersecurity Experts” h2_font_container=”tag:p|font_size:1.5em|text_align:left” h2_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” h4=”We will get back to you as quickly as possible!” h4_font_container=”tag:p|font_size:1.3em|text_align:left|color:rgba(157%2C157%2C158%2C0.89)” h4_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” style=”flat” css=”” use_custom_fonts_h2=”true” use_custom_fonts_h4=”true”]Get Help Now[/vc_cta][vc_column_text]Google was recently forced to patch a serious cross-site scripting (XSS) vulnerability on your favorite email client, Gmail. The Gmail vulnerability was discovered by an ethical hacker and chief […]

14.12.2020
Knowledge
cybersecurity tips for working from home
10 Cybersecurity Tips for Working from Home in 2021

[vc_row][vc_column][vc_cta h2=”Contact Our Ransomware & Cybersecurity Experts” h2_font_container=”tag:p|font_size:1.5em|text_align:left” h2_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” h4=”We will get back to you as quickly as possible!” h4_font_container=”tag:p|font_size:1.3em|text_align:left|color:rgba(157%2C157%2C158%2C0.89)” h4_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” style=”flat” css=”” use_custom_fonts_h2=”true” use_custom_fonts_h4=”true”]Get Help Now[/vc_cta][vc_column_text]As working from home becomes the new normal, the increase in cyberattacks is also gaining momentum. It seems that cybercriminals are using every possible opportunity to target remote workers […]

07.12.2020
Knowledge
ss7 security flaws
SS7 Attacks and Why 2 Factor Authentication Might Not Be Enough to Stop Ransomware

[vc_row][vc_column][vc_cta h2=”Contact Our Ransomware & Cybersecurity Experts” h2_font_container=”tag:p|font_size:1.5em|text_align:left” h2_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” h4=”We will get back to you as quickly as possible!” h4_font_container=”tag:p|font_size:1.3em|text_align:left|color:rgba(157%2C157%2C158%2C0.89)” h4_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” style=”flat” css=”” use_custom_fonts_h2=”true” use_custom_fonts_h4=”true”]Get Help Now[/vc_cta][vc_column_text]It’s the end of the month and you’ve got bills to pay. But instead of waiting in long queues at a nearby bank, you simply logon to your banking […]

16.10.2020
Knowledge
Emotet and ransomware
The Close Link between Emotet and Ransomware

[vc_row][vc_column][vc_cta h2=”Contact Our Ransomware & Cybersecurity Experts” h2_font_container=”tag:p|font_size:1.5em|text_align:left” h2_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” h4=”We will get back to you as quickly as possible!” h4_font_container=”tag:p|font_size:1.3em|text_align:left|color:rgba(157%2C157%2C158%2C0.89)” h4_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” style=”flat” css=”” use_custom_fonts_h2=”true” use_custom_fonts_h4=”true”]Get Help Now[/vc_cta][vc_column_text]In January of 2020, the US Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) warned of the resurgence of Emotet attacks. The DHS described Emotet as the […]

06.10.2020
Knowledge
CryptoCurrency and Ransomware
How Does Cryptocurrency Fuel Ransomware Attacks?

[vc_row][vc_column][vc_cta h2=”Contact Our Ransomware & Cybersecurity Experts” h2_font_container=”tag:p|font_size:1.5em|text_align:left” h2_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” h4=”We will get back to you as quickly as possible!” h4_font_container=”tag:p|font_size:1.3em|text_align:left|color:rgba(157%2C157%2C158%2C0.89)” h4_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” style=”flat” css=”” use_custom_fonts_h2=”true” use_custom_fonts_h4=”true”]Get Help Now[/vc_cta][vc_column_text] Cryptocurrency and the rise in ransomware attacks The vast majority of successful businesses have become an increasingly attractive target for ransom attacks where hackers hold data hostage, and […]

23.09.2020
Knowledge
BeforeCrypt and Markel Insurance Cyber Insurance
Announcing our Partnership with Markel Insurance to Prevent Ransomware Attacks

[vc_row][vc_column][vc_cta h2=”Contact Our Ransomware & Cybersecurity Experts” h2_font_container=”tag:p|font_size:1.5em|text_align:left” h2_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” h4=”We will get back to you as quickly as possible!” h4_font_container=”tag:p|font_size:1.3em|text_align:left|color:rgba(157%2C157%2C158%2C0.89)” h4_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” style=”flat” css=”” use_custom_fonts_h2=”true” use_custom_fonts_h4=”true”]Get Help Now[/vc_cta][vc_column_text]Increasing incidents of cybercrime and particularly ransomware, have become a menace to society. Data hostage situations leave firms with little to no choice other than paying a ransom and […]

16.09.2020
Knowledge
man in the middle attack
What is a Man-in-the-Middle-Attack (MITM) and How to Protect Yourself?

[vc_row][vc_column][vc_cta h2=”Contact Our Ransomware & Cybersecurity Experts” h2_font_container=”tag:p|font_size:1.5em|text_align:left” h2_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” h4=”We will get back to you as quickly as possible!” h4_font_container=”tag:p|font_size:1.3em|text_align:left|color:rgba(157%2C157%2C158%2C0.89)” h4_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” style=”flat” css=”” use_custom_fonts_h2=”true” use_custom_fonts_h4=”true”]Get Help Now[/vc_cta][vc_column_text] What is a Man-in-the-middle-attack and what are the tools available to protect yourself? Picture a situation where a banker is having a conversation, verifying username and password for […]

13.09.2020
Knowledge
What is Leakware?
What is Leakware, and What’s the Difference Between Leakware and Ransomware?

[vc_row][vc_column][vc_cta h2=”Contact Our Ransomware & Cybersecurity Experts” h2_font_container=”tag:p|font_size:1.5em|text_align:left” h2_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” h4=”We will get back to you as quickly as possible!” h4_font_container=”tag:p|font_size:1.3em|text_align:left|color:rgba(157%2C157%2C158%2C0.89)” h4_google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal” style=”flat” css=”” use_custom_fonts_h2=”true” use_custom_fonts_h4=”true”]Get Help Now[/vc_cta][vc_column_text] What is a Leakware? Is it the same as a Ransomware attack? We have already studied what ransomware is and have a detailed blog post on what you […]

10.09.2020