Lorenz Ransomware was initially observed in early (January/February of 2021). Over time, the ransomware has evolved to align itself (feature-wise) with other more well-known contemporaries. Lorenz operators embrace the multi-pronged extortion approach, and they host a blog with victim names and leaked data (for those that fail to “comply”).
Initial delivery of the ransomware is often handled via 3rd party framework, once persistence in the target environment has been established. Lorenz campaigns tend to be highly specific and well researched. Similar to other ransomware families, Lorenz will attempt to inhibit system recovery by destroying Volume Shadow Copies. This is in addition to other system modifications.
#cybersecurity #infosec #ransomware #lorenz
SentinelOne PartnerOne - America's 2025
⛳️ Last week in Pebble Beach the America's best cybersecurity partners came together for our annual PartnerOne summit. Check out…
Just a Sec: Cybersecurity Unfiltered—Fast, Frank, and From the Front Lines
Welcome to the first-ever Just A Sec, a no-holds-barred, quick-fire monthly livestream. It’s cybersecurity like you’ve never heard it before—unfiltered,…
See how our intelligent, autonomous cybersecurity platform harnesses the power of data and AI to protect your organization now and into the future.