Latest News Latest News

Cisco warns of actively exploited IOS XR zero-days

Cisco warned on Saturday about two zero-day vulnerability impacting the Internetwork Operating System (IOS) that ships with its networking equipment.

Read More...

New Chrome 0-day Under Active Attacks – Update Your Browser Now

Attention readers, if you are using Google Chrome browser on your Windows, Mac, or Linux computers, you need to update your web browsing software immediately to the latest version Google released earlier today.

Read More...

Google Warns of Zero-Click Bluetooth Flaws in Linux-based Devices

Google security researchers are warning of a new set of zero-click vulnerabilities in the Linux Bluetooth software stack that can allow a nearby unauthenticated, remote attacker to execute arbitrary code with kernel privileges on vulnerable devices.

Read More...

India Witnessed Spike in Cyber Attacks Amidst Covid-19 - Here's Why?

The COVID-19 outreach is turning out to be not only health, social, and economic hazard but also a cybersecurity crisis. The pandemic has presented new challenges for businesses in the areas of remote collaboration and business continuity.

Read More...

FIN11 Hackers Spotted Using New Techniques In Ransomware Attacks

A financially-motivated threat actor known for its malware distribution campaigns has evolved its tactics to focus on ransomware and extortion. "Recent FIN11 intrusions have most commonly led to data theft, extortion and the disruption of victim networks via the distribution of CLOP ransomware".

Read More...

Microsoft Releases Patches For Critical Windows TCP/IP and Other Bugs

Microsoft on Tuesday issued fixes for 87 newly discovered security vulnerabilities as part of its October 2020 Patch Tuesday, including two critical remote code execution (RCE) flaws in Windows TCP/IP stack and Microsoft Outlook.

Read More...

Watch Out — Microsoft Warns Android Users About A New Ransomware

Microsoft has warned about a new strain of mobile ransomware that takes advantage of incoming call notifications and Android's Home button to lock the device behind a ransom note.

Read More...

Researchers Find Vulnerabilities in Microsoft Azure Cloud Service

As businesses are increasingly migrating to the cloud, securing the infrastructure has never been more important. Now according to the latest research, two security flaws in Microsoft's Azure App Services could have enabled a bad actor to carry out server-side request forgery (SSRF) attacks or execute arbitrary code and take over the administration server.

Read More...

Google Researcher Reported 3 Flaws in Apache Web Server Software

If your web-server runs on Apache, you should immediately install the latest available version of the server application to prevent hackers from taking unauthorized control over it.

Read More...

Two Critical Flaws in Zoom Could've Let Attackers Hack Systems via Chat

If you're using Zoom—especially during this challenging time to cope with your schooling, business, or social engagement—make sure you are running the latest version of the widely popular video conferencing software on your Windows, macOS, or Linux computers.

Read More...

Contact Us Contact Us

Free Call[OH]: 933

Phone Number: +251-900-89-64-48,

                            +251-944-33-68-02

E-mail: ethiocert@insa.gov.et

P.O.Box: 124498

Download PGP Keys


Report an Incident

Tool Tool

Mabezat Recovery Tool

Mabezat Recovery Tool

  • Virus Name "Mabezat.b"
  • Virus generation B
  • Infection type – files infection and encryption
  • Mebezat.b virus attack details
·    Mebazat encrypts files by adding 0x10 to each byte of the file (*.TXT, *.BAS, *.C, *.MDB, *.ZIP, *.RAR *.DOC, *.XLS, *.CPP, *.H, *.PAS, *.ASP, *.PHP, *.PPT, *.HTM, *.RTF, *.MDF, ,*.PSD, *.ASPX, *.ASPX.CS, *.HTML, *.PDF, *.HLP)
·    It encrypts files that are created staring from 2012/10/16
·    The encryption lasts until it reaches its size (around 79360 byte)
·    The encryption is symmetric
·    Appends "TAZEBAMA.3515" string at the end of file

Recovery details 

  • The tool recovers different files encrypted by Mabezat virus. It has two options for recovering files
    • Single file recovery option
    • Multiple files recovery option (provided in a specific directory)
  • It recovers files and then stores them in a new directory called "Recovered" by the same filename. The "Recovered" directory is created for each new directories where corrupted files are present
  • To use the single file recovery option, first check the "for single file recovery click here" option and select the file to recover.
  • Minimum requirements
    • XP service pack2 and above
    • For service pack 1 users upgrade to service pack 2 or above
    • Download the tool here

 Mabezat Recovery Tool Screenshots


Values Values

  • Trustworthiness
  • Innovation
  • Scientific
  • Democracy
  • Synergy
  • Saving