New ShrinkLocker Ransomware Exploits Windows BitLocker for Data Encryption
Researchers identify a sophisticated attack targeting government and corporate systems across multiple countries.
- ShrinkLocker uses BitLocker to encrypt data, making recovery difficult without the attacker's key.
- The ransomware creates new boot partitions by shrinking existing non-boot volumes.
- Targets include government entities and companies in the vaccine and manufacturing sectors.
- ShrinkLocker avoids detection by checking for specific Windows versions and domains before executing.
- Kaspersky recommends robust endpoint protection and secure storage of recovery keys to mitigate risks.