{"id":22612,"date":"2022-07-19T18:30:54","date_gmt":"2022-07-19T18:30:54","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=22612"},"modified":"2022-07-19T18:30:56","modified_gmt":"2022-07-19T18:30:56","slug":"lilith-ransomware","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/","title":{"rendered":"Lilith: The Latest Threat in Ransomware"},"content":{"rendered":"\n<p>Discovered by <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a> hunter <a href=\"https:\/\/twitter.com\/JAMESWT_MHT\/status\/1544946534915219456\" target=\"_blank\" rel=\"noreferrer noopener\">JAMESWT<\/a> on Twitter, Lilith is <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">ransomware<\/a> designed to lock Windows machines. The malware exfiltrates data before encrypting the targeted devices to provide additional means of extortion.<\/p>\n\n\n\n<p>The ransom note contains the following ultimatum and instructions:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/aPCwzFLjbUKCM2GJm3_d49t0lJFKXkIxxHNF8MF1ttPzevOEWmM9swSH0Wbct8XUL3ZoBNWeTk1Ng0YLCfQsWB0DeMyRJZ8fZbWeRw9-hc0CXGqi7Xif72Pz3QrDBa8fBTw9QyUi6dCWQZ3s\" alt=\"\"\/><\/figure>\n\n\n\n<p>Victims have three days to contact the threat actors on a hidden Onion website to pay the ransom. While Lilith does not introduce any innovative approach, according to Cyble, it clearly shows a trend in the current ransomware landscape.<\/p>\n\n\n\n<p>The hackers posted their first victim on a data leak site before removing the publication later. The victim was a large construction group based in South America, which suggests that the hackers are aiming high &#8211; and may also be sensitive to any potential backlash from countries or law enforcement.<\/p>\n\n\n\n<p>Cyble <a href=\"https:\/\/blog.cyble.com\/2022\/07\/12\/new-ransomware-groups-on-the-rise\/\" target=\"_blank\" rel=\"noreferrer noopener\">warned<\/a> companies about a new \u201cwave of ransomware campaigns\u201d involving groups like RedAlert, Lilith And 0mega, focusing on Lilith in depth.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/ransomware-removal-and-recovery-services\/\">Best Ransomware Removal and Recovery Services<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How Lilith Ransomware Operates<\/strong><\/h2>\n\n\n\n<p>Lilith is written in C\/C++ and targets 64-bit Windows systems. The malware uses a custom \u201c.lilith\u201d extension to rename encrypted files.<\/p>\n\n\n\n<p>According to Cyble, \u201cThe ransomware searches for files to encrypt on the local system by enumerating the file directories [&#8230;] It ignores the file extensions such as EXE, DLL, and SYS and excludes a list of directory and file names from the encryption process.\u201d<\/p>\n\n\n\n<p>Cyble adds that \u201cupon execution, Lilith ransomware initially searches for a list of hardcoded processes in the file and terminates its execution if any of them are running on the target\u2019s machine.\u201d<\/p>\n\n\n\n<p>That way, the ransomware increases its chances of success significantly. Besides, the files are encrypted using local Windows cryptographic APIs and random keys generated on the fly.<\/p>\n\n\n\n<p>The researchers found artifacts in the code base that point to the BABUK ransomware, as Lilith excludes \u201cecdh_pub_k.bin,\u201d the public key used by BABUK, which could be a link between the two campaigns.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How to Protect Against Lilith Ransomware<\/strong><\/h2>\n\n\n\n<p>Threat actors are aware that security teams are increasingly ready to fight, succeeding sometimes even before the deadline (see <a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-one-company-survived-ransomware\/\">How One Company Survived a Ransomware Attack Without Paying the Ransom<\/a>).<\/p>\n\n\n\n<p>This double-extortion model is here to stay. Classic but efficient measures to prevent ransomware attacks are strongly recommended, but the key might be a tested recovery strategy and a <a href=\"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/\">continuity<\/a> plan. Such an approach involves proper backups and documented procedures.<\/p>\n\n\n\n<p><em>See the<\/em><em> <\/em><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-backup-solutions-for-ransomware-protection\/\"><em>Best Backup Solutions for Ransomware Protection<\/em><\/a><\/p>\n\n\n\n<p>In addition, don\u2019t forget to scan your backup files for infection, and as it\u2019s essential not to let Lilith spread around your network and devices, infected machines must be isolated<\/p>\n\n\n\n<p>Organizations should also leverage proper <a href=\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-software\/\">network segmentation<\/a>. While the investments might be significant, the cost of ransomware attacks is usually high, and Lilith seems to target big companies.<\/p>\n\n\n\n<p>One of the critical aspects of these attacks is obviously the ransom payment. Official recommendations by security agencies and governments will likely <a href=\"https:\/\/www.cisa.gov\/stopransomware\" target=\"_blank\" rel=\"noreferrer noopener\">discourage<\/a> the victims from paying any ransom. The reason is simple: there\u2019s no guarantee you&#8217;ll get a working recovery key, regardless of what attackers might say.<\/p>\n\n\n\n<p>You might get more damage with so-called decryptors that actually install other malware, and the attack could also escalate to include additional payment demands.<\/p>\n\n\n\n<p>That&#8217;s not to blame companies that made that choice. The pressure might be overwhelming and the stakes too high to resist the temptation to pay the ransom. Being offline for an extended period of time can easily outweigh the ransom price.<\/p>\n\n\n\n<p>However, another reason why it is not recommended to pay the ransom is that it could be illegal.<\/p>\n\n\n\n<p>Companies should prepare for such bad events and ensure that paying the ransom won\u2019t be used against them in court, as authorities might view it as encouraging cybercriminals or cyber terrorism.<\/p>\n\n\n\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/\">How to Recover From a Ransomware Attack<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6ebfc892c4-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6ebfc892c4\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6ebfc892c4\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6ebfc892c4\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6ebfc892c4\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6ebfc892c4\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6ebfc892c4\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Discovered by malware hunter JAMESWT on Twitter, Lilith is ransomware designed to lock Windows machines. The malware exfiltrates data before encrypting the targeted devices to provide additional means of extortion. The ransom note contains the following ultimatum and instructions: Victims have three days to contact the threat actors on a hidden Onion website to pay [&hellip;]<\/p>\n","protected":false},"author":267,"featured_media":22614,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[31790],"class_list":["post-22612","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Lilith: The Latest Threat in Ransomware | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Lilith is the latest ransomware to encrypt machines and steal data. Here&#039;s how it works and how to prevent it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lilith: The Latest Threat in Ransomware | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Lilith is the latest ransomware to encrypt machines and steal data. Here&#039;s how it works and how to prevent it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-19T18:30:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-19T18:30:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/07\/lilith.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"812\" \/>\n\t<meta property=\"og:image:height\" content=\"277\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Julien Maury\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julien Maury\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/\"},\"author\":{\"name\":\"Julien Maury\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\"},\"headline\":\"Lilith: The Latest Threat in Ransomware\",\"datePublished\":\"2022-07-19T18:30:54+00:00\",\"dateModified\":\"2022-07-19T18:30:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/\"},\"wordCount\":648,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/07\/lilith.jpeg\",\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/\",\"name\":\"Lilith: The Latest Threat in Ransomware | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/07\/lilith.jpeg\",\"datePublished\":\"2022-07-19T18:30:54+00:00\",\"dateModified\":\"2022-07-19T18:30:56+00:00\",\"description\":\"Lilith is the latest ransomware to encrypt machines and steal data. Here's how it works and how to prevent it.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/07\/lilith.jpeg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/07\/lilith.jpeg\",\"width\":812,\"height\":277,\"caption\":\"lilith ransomware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Lilith: The Latest Threat in Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\",\"name\":\"Julien Maury\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"caption\":\"Julien Maury\"},\"description\":\"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jmaury\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lilith: The Latest Threat in Ransomware | eSecurity Planet","description":"Lilith is the latest ransomware to encrypt machines and steal data. Here's how it works and how to prevent it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"Lilith: The Latest Threat in Ransomware | eSecurity Planet","og_description":"Lilith is the latest ransomware to encrypt machines and steal data. Here's how it works and how to prevent it.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/","og_site_name":"eSecurity Planet","article_published_time":"2022-07-19T18:30:54+00:00","article_modified_time":"2022-07-19T18:30:56+00:00","og_image":[{"width":812,"height":277,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/07\/lilith.jpeg","type":"image\/jpeg"}],"author":"Julien Maury","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Julien Maury","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/"},"author":{"name":"Julien Maury","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a"},"headline":"Lilith: The Latest Threat in Ransomware","datePublished":"2022-07-19T18:30:54+00:00","dateModified":"2022-07-19T18:30:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/"},"wordCount":648,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/07\/lilith.jpeg","articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/","url":"https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/","name":"Lilith: The Latest Threat in Ransomware | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/07\/lilith.jpeg","datePublished":"2022-07-19T18:30:54+00:00","dateModified":"2022-07-19T18:30:56+00:00","description":"Lilith is the latest ransomware to encrypt machines and steal data. Here's how it works and how to prevent it.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/07\/lilith.jpeg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/07\/lilith.jpeg","width":812,"height":277,"caption":"lilith ransomware"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/lilith-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Lilith: The Latest Threat in Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a","name":"Julien Maury","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","caption":"Julien Maury"},"description":"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.","url":"https:\/\/www.esecurityplanet.com\/author\/jmaury\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/22612"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/267"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=22612"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/22612\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/22614"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=22612"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=22612"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=22612"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=22612"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=22612"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=22612"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}