{"id":207986,"date":"2025-03-07T06:29:57","date_gmt":"2025-03-07T12:29:57","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2025\/03\/ransomware-gang-encrypted-network-from-a-webcam-to-bypass-edr"},"modified":"2025-03-07T06:29:57","modified_gmt":"2025-03-07T12:29:57","slug":"ransomware-gang-encrypted-network-from-a-webcam-to-bypass-edr","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2025\/03\/ransomware-gang-encrypted-network-from-a-webcam-to-bypass-edr","title":{"rendered":"Ransomware gang encrypted network from a webcam to bypass EDR"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/ransomware-gang-encrypted-network-from-a-webcam-to-bypass-edr.jpg\"><\/a><\/p>\n<p>The Akira ransomware gang was spotted using an unsecured webcam to launch encryption attacks on a victim\u2019s network, effectively circumventing Endpoint Detection and Response (EDR), which was blocking the encryptor in Windows.<\/p>\n<p>Cybersecurity firm S-RM team discovered the unusual attack method during a recent incident response at one of their clients.<\/p>\n<p>Notably, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fbi-akira-ransomware-raked-in-42-million-from-250-plus-victims\/\" target=\"_blank\" rel=\"nofollow noopener\">Akira<\/a> only pivoted to the webcam after attempting to deploy encryptors on Windows, which were blocked by the victim\u2019s EDR solution.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Akira ransomware gang was spotted using an unsecured webcam to launch encryption attacks on a victim\u2019s network, effectively circumventing Endpoint Detection and Response (EDR), which was blocking the encryptor in Windows. Cybersecurity firm S-RM team discovered the unusual attack method during a recent incident response at one of their clients. Notably, Akira only pivoted [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,1625],"tags":[],"class_list":["post-207986","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-encryption"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/207986","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=207986"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/207986\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=207986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=207986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=207986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}