Description
[WastedLocker](https://attack.mitre.org/software/S0612) is a ransomware family attributed to [Indrik Spider](https://attack.mitre.org/groups/G0119) that has been used since at least May 2020. [WastedLocker](https://attack.mitre.org/software/S0612) has been used against a broad variety of sectors, including manufacturing, information technology, and media.(Citation: Symantec WastedLocker June 2020)(Citation: NCC Group WastedLocker June 2020)(Citation: Sentinel Labs WastedLocker July 2020)
External References
Techniques Used by This Malware
- T1012 — Query Registry
- T1027.013 — Encrypted/Encoded File
- T1027.016 — Junk Code Insertion
- T1059.003 — Windows Command Shell
- T1083 — File and Directory Discovery
- T1106 — Native API
- T1112 — Modify Registry
- T1120 — Peripheral Device Discovery
- T1135 — Network Share Discovery
- T1140 — Deobfuscate/Decode Files or Information
- T1222.001 — Windows File and Directory Permissions Modification
- T1486 — Data Encrypted for Impact
- T1490 — Inhibit System Recovery
- T1497.001 — System Checks
- T1543.003 — Windows Service
- T1548.002 — Bypass User Account Control
- T1564.001 — Hidden Files and Directories
- T1564.004 — NTFS File Attributes
- T1569.002 — Service Execution
- T1574.001 — DLL