Latest News Latest News

Critical RCE Flaws Affect VMware ESXi and vSphere Client — Patch Now

VMware has addressed multiple critical remote code execution (RCE) vulnerabilities in VMware ESXi and vSphere Client virtual infrastructure management platform that may allow attackers to execute arbitrary commands and take control of affected systems.

Read More...

Masslogger Trojan Upgraded to Steal All Your Outlook, Chrome Credentials

A credential stealer infamous for targeting Windows systems has resurfaced in a new phishing campaign that aims to steal credentials from Microsoft Outlook, Google Chrome, and instant messenger apps.

Read More...

Privacy Bug in Brave Browser Exposes Dark-Web Browsing History of Its Users

Brave has fixed a privacy issue in its browser that sent queries for .onion domains to public internet DNS resolvers rather than routing them through Tor nodes, thus exposing users' visits to dark web websites. The bug was addressed in a hotfix release (V1.20.108).

Read More...

New Chrome Browser 0-day Under Active Attack—Update Immediately!

Google has patched a zero-day vulnerability in Chrome web browser for desktop that it says is being actively exploited in the wild.

Read More...

Emotet Malware

Emotet—a sophisticated Trojan commonly functioning as a downloader or dropper of other malware—resurged in July 2020, after a dormant period that began in February. Since August, emotet increase in malicious cyber actors targeting state and local governments with it's phishing emails. This increase has rendered Emotet one of the most prevalent ongoing threats.

Read More...

New Cryptojacking Malware Targeting Apache, Oracle, Redis Servers

A financially-motivated threat actor notorious for its cryptojacking attacks has leveraged a revised version of their malware to target cloud infrastructures using vulnerabilities in web server technologies.

Read More...

Italy CERT Warns of a New Credential Stealing Android Malware

Researchers have disclosed a new family of Android malware that abuses accessibility services in the device to hijack user credentials and record audio and video.

Read More...

New Attack Could Let Remote Hackers Target Devices On Internal Networks

A newly devised variant of the NAT Slipstreaming attack can be leveraged to compromise and expose any device in an internal network.

Read More...

Microsoft Issues Patches for Defender Zero-Day and 82 Other Windows Flaws

For the first patch Tuesday of 2021, Microsoft released security updates addressing a total of 83 flaws spanning as many as 11 products and services, including an actively exploited zero-day vulnerability.

Read More...

Ransomware Attackers Using SystemBC Malware With RAT and Tor Proxy

Cybercriminals are increasingly outsourcing the task of deploying ransomware to affiliates using commodity malware and attack tools.

Read More...

Contact Us Contact Us

Free Call[OH]: 933

Phone Number: +251-993939270,

                            +251-936825343,

                            +251-944-33-68-02

E-mail: ethiocert@insa.gov.et

P.O.Box: 124498

Download PGP Keys


Report an Incident

Tool Tool

Back

Mabezat Recovery Tool

Mabezat Recovery Tool

  • Virus Name "Mabezat.b"
  • Virus generation B
  • Infection type – files infection and encryption
  • Mebezat.b virus attack details
·    Mebazat encrypts files by adding 0x10 to each byte of the file (*.TXT, *.BAS, *.C, *.MDB, *.ZIP, *.RAR *.DOC, *.XLS, *.CPP, *.H, *.PAS, *.ASP, *.PHP, *.PPT, *.HTM, *.RTF, *.MDF, ,*.PSD, *.ASPX, *.ASPX.CS, *.HTML, *.PDF, *.HLP)
·    It encrypts files that are created staring from 2012/10/16
·    The encryption lasts until it reaches its size (around 79360 byte)
·    The encryption is symmetric
·    Appends "TAZEBAMA.3515" string at the end of file

Recovery details 

  • The tool recovers different files encrypted by Mabezat virus. It has two options for recovering files
    • Single file recovery option
    • Multiple files recovery option (provided in a specific directory)
  • It recovers files and then stores them in a new directory called "Recovered" by the same filename. The "Recovered" directory is created for each new directories where corrupted files are present
  • To use the single file recovery option, first check the "for single file recovery click here" option and select the file to recover.
  • Minimum requirements
    • XP service pack2 and above
    • For service pack 1 users upgrade to service pack 2 or above
    • Download the tool here

 Mabezat Recovery Tool Screenshots


Values Values

  • Trustworthiness
  • Innovation
  • Scientific
  • Democracy
  • Synergy
  • Saving