Blue Locker Ransomware

This flow details the Blue Locker ransomware campaign targeting Pakistan's oil and gas sector through phishing emails with malicious attachments. The attack employs a PowerShell-based loader to establish persistence via registry modification, escalate privileges by bypassing UAC, and evade detection through obfuscation and timestomping techniques. The ransomware ultimately encrypts victim files with a '.Blue' extension after deleting system backups using WMIC commands.

A
Anonymous
2 days ago
64
Views
26
Nodes
React Flow mini map
Blue Locker Ransomware - FlowViz Gallery