{"id":32909,"date":"2020-01-21T16:45:02","date_gmt":"2020-01-21T16:45:02","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/30861\/Antivirus-Vendors-Push-Fixes-For-EFS-Ransomware-Attack-Method.html"},"modified":"2020-01-21T16:45:02","modified_gmt":"2020-01-21T16:45:02","slug":"antivirus-vendors-push-fixes-for-efs-ransomware-attack-method","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\/","title":{"rendered":"Antivirus Vendors Push Fixes For EFS Ransomware Attack Method"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/r\/2020\/01\/19\/f9617462-7c11-4e85-a938-ba137573db47\/thumbnail\/770x578\/e85517602bef5f9d5036810a47c47b7e\/screenshot-2020-01-19-at-16-29-25.png\" class=\"ff-og-image-inserted\"><\/div>\n<p>Researchers have disclosed how an EFS attack launched by ransomware leaves systems relying on signature-based antivirus solutions open to attack, with major vendors pushing fixes left, right, and center as a result.&nbsp;<\/p>\n<p>On Tuesday, Amit Klein, the VP of Security Research at Safebreach Labs <a href=\"https:\/\/safebreach.com\/Post\/EFS-Ransomware\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">revealed an investigation<\/a> into how the Windows Encrypting File System (EFS) can be abused by ransomware, a form of malware that encrypts systems and demands payment in return for the restoration of access.&nbsp;<\/p>\n<p>A lab-based exploration of EFS, developed by Microsoft as an NTFS alternative to full disk encryption provided by BitLocker in order to encrypt individual files or directories, found that major antivirus solutions might not protect the system.&nbsp;<\/p>\n<p><a href=\"https:\/\/safebreach.com\/Post\/EFS-Ransomware\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">In a blog post<\/a>, Safebreach Labs said that after testing three major anti-ransomware solutions offered by cybersecurity vendors, all three failed to stop attacks.&nbsp;<\/p>\n<p><strong>TechRepublic:&nbsp;<\/strong><a href=\"https:\/\/www.techrepublic.com\/article\/why-baby-boomers-are-looking-to-iot-and-analytics-to-stay-safe\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Why baby boomers are looking to IoT and analytics to stay safe<\/a><\/p>\n<p>The security solutions tested were ESET Internet Security 12.1.34.0, Kaspersky Anti Ransomware Tool for Business 4.0.0.861(a), and Microsoft Windows 10 Controlled Folder Access on Windows 10 64-bit version 1809 (Build 17763) using a virtual Windows 10 machine loaded up with a variety of different content and file types. &nbsp;<\/p>\n<p>Safebreach Labs tested whether or not EFS could be exploited by creating its own ransomware variant employing tactics including the generation of keys and certificates. To begin the attack chain, the ransomware created both and then added the certificate to the personal certificate store, assigning the new key to act as the current EFS key, and invoked it on the files or folders destined for deletion.&nbsp;<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>The next step involved saving the key file to memory and deleting it from %APPDATA% \\Microsoft\\Crypto\\RSA\\[user SID]\\ and %ProgramData%\\Microsoft\\Crypto\\RSA\\MachineKeys\\. EFS data was then flushed from memory, which made sure the &#8220;encrypted files become[s] unreadable to the user (and operating system),&#8221; according to the team.&nbsp;<\/p>\n<p><strong>See also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/jhonerat-exploits-microsoft-office-cloud-services-to-attack-middle-eastern-countries\/\" target=\"_blank\" rel=\"noopener noreferrer\">JhoneRAT exploits cloud services to attack Middle Eastern countries<\/a><\/p>\n<p>If possible, the malware would then wipe slack parts of the disk, followed by the encryption of the key file data using a hard-wired public key in the ransomware. At this point, it could also be possible to send stolen information to an attacker&#8217;s command-and-control (C2) center.&nbsp;<\/p>\n<p>According to the researchers, the encryption activities of EFS-based ransomware take place in the kernel and as the NTFS driver is in play, may also go unnoticed by file-system filter drivers. No human interaction or administration rights are required.&nbsp;<\/p>\n<p>However, padlock icons are shown when files are encrypted &#8212; which may give victims an indication that all is not well &#8212; and if Data Recovery Agent is enabled, recovery can be &#8220;trivial,&#8221; the team says.<\/p>\n<p>Safebreach Labs developed Proof of Concept (PoC) code and provided this, together with a report, to 17 cybersecurity vendors. As a result, the team realized more products were affected than originally thought.&nbsp;<\/p>\n<p>Below is the rundown on each vendor, their susceptibility, and any actions taken:<\/p>\n<ul>\n<li><strong>Avast<\/strong>, Antivirus: &#8220;We implemented a workaround for version <a href=\"https:\/\/forum.avast.com\/index.php?topic=229461.0\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">19.8<\/a>.&#8221; Avast, too, provided the researchers with a $1000 bounty.&nbsp;<\/li>\n<li><strong>Avira<\/strong>, Antivirus: &#8220;We have taken an exhaustive look at this potential vulnerability. While we value the reports of this potential vulnerability, we believe that this potential bypass which is dependent upon a customized use scenario is not a realistic &#8216;failure point.'&#8221;<\/li>\n<li><strong>Bitdefender<\/strong>: &#8220;As of today [January 10], the fix started rolling out on Bitdefender Antivirus, Bitdefender Total Security and Bitdefender Internet Security on version 24.0.14.85. On Bitdefender Free Edition the fix is in reporting mode only, being necessary for fine-tuning in the future.&#8221;<\/li>\n<li><strong>Check Point<\/strong>, SandBlast Agent | Zone Alarm: &#8220;Check Point has resolved the issue and the fix is currently available with the latest Corporate Endpoint Client E82.30 and will be available in the latest release of Zone Alarm Anti-Ransomware in the next couple of days.&#8221;<\/li>\n<li><strong>D7xTech<\/strong>, CryptoPrevent Anti Malware: Vendor notified July 5th, status unknown.<\/li>\n<li><strong>ESET<\/strong>, Ransomware Shield technology products: &#8220;In June of 2019, ESET was made aware of a possible security bypass of its consumer, business and server products for Windows via the standard Windows API EncryptFile. ESET was able to validate the underlying method used to administer this attack. We are now rolling out an update to mitigate the bypass and would like to kindly ask all customers to refer to Customer Advisory 2020-0002 for more information on mitigation options regarding the bypass published in this report.&#8221;<\/li>\n<li><strong>F-Secure<\/strong>, Internet Security (with DeepGuard) | SAFE: Already detected as suspicious: W32\/Malware!Online and Trojan.TR\/Ransom.Gen.<\/li>\n<li><strong>GridinSoft<\/strong>, GS Anti-Ransomware [beta]: &#8220;We have a free beta-test version of the program released in 2016. Since then it has not been updated and the main release version of the product has not been published. Since the program was last updated in 2016, it is more than logical that it protects against those ransomware families that were popular until 2016.&#8221;<\/li>\n<li><strong>IObit<\/strong>, Malware Fighter: A fix is now available in version 7.2.<\/li>\n<li><strong>Kaspersky<\/strong> (all): All the products were updated to protect against the technique.<\/li>\n<li><strong>McAfee<\/strong>, Endpoint products: &#8220;McAfee released protection against the sample code provided by the reporter in the Anti-Virus (AV) DATs released on 10th January. This covers both our Enterprise and Consumer products. The AV DATs are automatically updated and Customers can check the version of the DATs through the product User Interface. Enterprise Customers using MVision EDR have a detection rule available from 10th January which will trigger when some variations of this Proof of Concept are executed. Through EDR the administrator can scan their machines for other instances of the malware and then block execution or delete the malware.&#8221;<\/li>\n<li><strong>Microsoft<\/strong>, Windows Controlled Folder Access: &#8220;Microsoft considers Controlled Folder Access a defense-in-depth feature. We assessed this submittal to be a moderate class defense-in-depth issue, which does not meet the Microsoft Security Servicing Criteria for Windows. Microsoft may consider addressing this in a future product.&#8221;<\/li>\n<li><strong>Panda Security<\/strong>, Panda Adaptive Defense | Panda Dome Advanced: &#8220;Our protection approach for the Panda Adaptive Defense product line is not based on patterns but on classifying all the files\/processes running at the end-point. Thus, any attack using unknown files\/processes will be detected and blocked.&#8221;<\/li>\n<li><strong>Sophos<\/strong>, Intercept-X Endpoint | CryptoGuard: &#8220;We&#8217;ve updated Sophos Intercept X, and all customers using this product are protected.&#8221;<\/li>\n<li><strong>Symantec<\/strong>, Endpoint Protection:&nbsp; &#8220;We pushed out two detection signatures to mitigate the issue. Both of these signatures have been pushed out to all endpoints via our live update.&#8221;<\/li>\n<li><strong>TrendMicro<\/strong>, Apex One | RansomBuster: &#8220;Trend Micro is currently researching and working on implementing some enhancements to our endpoint protection products with anti-ransomware capabilities to try and prevent these types of attacks (ETA still in development). In the meantime, we recommend disabling EFS if it is not in [sic] use.&#8221;<\/li>\n<li><strong>Webroot<\/strong>, SecureAnywhere AV: &#8220;We appreciate SafeBreach bringing this new technique to our attention. While we haven&#8217;t seen this technique used in the wild yet, we now can arm our threat researchers with intel to combat it in the future.&#8221;<\/li>\n<\/ul>\n<p><strong>CNET:&nbsp;<\/strong><a href=\"https:\/\/www.cnet.com\/reviews\/nordvpn-review\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">NordVPN review: Still the best value for security and speed<\/a><\/p>\n<p>A possible workaround is for administrators to change registry keys to turn off EFS, as well as use Group Policy in enterprise settings. However, if EFS is in active and legitimate use, then disabling the setting may impact required file protections.&nbsp;<\/p>\n<p>&#8220;It is clear that in the face of the expected evolution of ransomware, that new anti-ransomware technologies need to be developed if the ransomware threat is to be contained and kept at bay,&#8221; the researchers say. &#8220;Signature-based solutions are not up to this job, heuristics-based (and even more so &#8212; generic technology-based) solutions seem more promising, but additional proactive research is required in order to &#8220;train&#8221; them against future threats.&#8221;<\/p>\n<h3>Previous and related coverage<\/h3>\n<hr>\n<p><strong>Have a tip?<\/strong> Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0<\/p>\n<hr>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/30861\/Antivirus-Vendors-Push-Fixes-For-EFS-Ransomware-Attack-Method.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":32910,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[8398],"class_list":["post-32909","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinemalwareviruscybercrimefraudcryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Antivirus Vendors Push Fixes For EFS Ransomware Attack Method 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Antivirus Vendors Push Fixes For EFS Ransomware Attack Method 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-21T16:45:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method.png\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Antivirus Vendors Push Fixes For EFS Ransomware Attack Method\",\"datePublished\":\"2020-01-21T16:45:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\\\/\"},\"wordCount\":1314,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method.png\",\"keywords\":[\"headline,malware,virus,cybercrime,fraud,cryptography\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\\\/\",\"name\":\"Antivirus Vendors Push Fixes For EFS Ransomware Attack Method 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method.png\",\"datePublished\":\"2020-01-21T16:45:02+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method.png\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,malware,virus,cybercrime,fraud,cryptography\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinemalwareviruscybercrimefraudcryptography\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Antivirus Vendors Push Fixes For EFS Ransomware Attack Method\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Antivirus Vendors Push Fixes For EFS Ransomware Attack Method 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\/","og_locale":"en_US","og_type":"article","og_title":"Antivirus Vendors Push Fixes For EFS Ransomware Attack Method 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-01-21T16:45:02+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Antivirus Vendors Push Fixes For EFS Ransomware Attack Method","datePublished":"2020-01-21T16:45:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\/"},"wordCount":1314,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method.png","keywords":["headline,malware,virus,cybercrime,fraud,cryptography"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\/","url":"https:\/\/www.threatshub.org\/blog\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\/","name":"Antivirus Vendors Push Fixes For EFS Ransomware Attack Method 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method.png","datePublished":"2020-01-21T16:45:02+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method.png","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/antivirus-vendors-push-fixes-for-efs-ransomware-attack-method\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,malware,virus,cybercrime,fraud,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinemalwareviruscybercrimefraudcryptography\/"},{"@type":"ListItem","position":3,"name":"Antivirus Vendors Push Fixes For EFS Ransomware Attack Method"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32909","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=32909"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32909\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/32910"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=32909"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=32909"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=32909"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}