<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic New Mallox Ransomware Variant Targets Linux Systems in Threats</title>
    <link>https://community.isc2.org/t5/Threats/New-Mallox-Ransomware-Variant-Targets-Linux-Systems/m-p/71867#M1248</link>
    <description>&lt;P&gt;HI All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;The new Mallox variant encrypts user data and appends a .locked extension to encrypted files, whereas previous versions &lt;A class="" href="http://used.NET" target="_self"&gt;used.NET&lt;/A&gt;-based,.EXE, or.DLL files and were distributed via MS-SQL servers and phishing or spam emails. The malware includes routes for various functions, including user authentication, build management, new user registration, login and password reset, and ransomware build creation.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;&lt;A href="https://hackread.com/mallox-ransomware-variant-targets-linux-systems/#google_vignette" target="_blank" rel="noopener"&gt;https://hackread.com/mallox-ransomware-variant-targets-linux-systems/#google_vignette&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;Caute_Cautim&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 10 Jul 2024 21:04:42 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2024-07-10T21:04:42Z</dc:date>
    <item>
      <title>New Mallox Ransomware Variant Targets Linux Systems</title>
      <link>https://community.isc2.org/t5/Threats/New-Mallox-Ransomware-Variant-Targets-Linux-Systems/m-p/71867#M1248</link>
      <description>&lt;P&gt;HI All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;The new Mallox variant encrypts user data and appends a .locked extension to encrypted files, whereas previous versions &lt;A class="" href="http://used.NET" target="_self"&gt;used.NET&lt;/A&gt;-based,.EXE, or.DLL files and were distributed via MS-SQL servers and phishing or spam emails. The malware includes routes for various functions, including user authentication, build management, new user registration, login and password reset, and ransomware build creation.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;&lt;A href="https://hackread.com/mallox-ransomware-variant-targets-linux-systems/#google_vignette" target="_blank" rel="noopener"&gt;https://hackread.com/mallox-ransomware-variant-targets-linux-systems/#google_vignette&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;Caute_Cautim&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2024 21:04:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/New-Mallox-Ransomware-Variant-Targets-Linux-Systems/m-p/71867#M1248</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-07-10T21:04:42Z</dc:date>
    </item>
  </channel>
</rss>

