Close Menu
NotesleuNotesleu
    Facebook X (Twitter) Instagram
    Wednesday, February 11
    Facebook X (Twitter) Instagram
    NotesleuNotesleu
    • Home
    • General News
    • Cyber Attacks
    • Threats
    • Vulnerabilities
    • Cybersecurity
    • Contact Us
    • More
    NotesleuNotesleu
    Home»Cybersecurity»Independent Lab Validates Nubeva’s Innovative Ransomware Key Interception and Decryption Technology
    Cybersecurity

    Independent Lab Validates Nubeva’s Innovative Ransomware Key Interception and Decryption Technology

    By securnerd3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Follow Us
    Google News

    Nubeva, a tech company headquartered in San Jose, California, has developed a unique product, NuRR (Nubeva Ransomware Reversal), touted to capture encryption keys at the onset of a ransomware’s encryption operation. If successful, the captured keys can be used to decrypt any files encrypted by the ransomware, eliminating the need to pay a ransom.

    The Maryland Innovation & Security Institute’s (MISI) DreamPort facility conducted a thorough evaluation of these claims. MISI, a non-profit aimed at advancing discovery, education, innovation, and collaboration in cybersecurity, formed the DreamPort facility in alliance with the US Cyber Command (USCYBERCOM). Although not directly governed by the government, one of MISI’s fundamental tenets is offering independent validation of product claims for governmental use.

    The NuRR technology works by operating a small agent quietly in the background on each endpoint. Triggered by the earliest signs of unusual or mass encryption, it captures and extracts the encryption keys from the process.

    However, NuRR is not a solution for ransomware prevention; companies still require robust prevention systems. NuRR serves as a safety net when these prevention systems fail.

    MISI conducted the testing at DreamPort for a period of four weeks, during which numerous popular ransomware variants were set off on Windows endpoints where NuRR was installed. It’s important to note that during this process, Nubeva maintained no connection or relationship with MISI.

    The key objective of the tests was to scrutinize NuRR’s capacity to seize ransomware cryptographic keys and verify if Nubeva’s decryptors could subsequently restore the encrypted data. The variants used for this purpose included Lockbit 3, Blackcat/ALPHV, CL0P, PLAY, Black Basta, Ragnar Locker, Conti, REvil, among others—collectively representing a significant proportion of real attacks over the past year.

    The findings, published in July 2023, revealed NuRR’s remarkable performance across all 17 of MISI’s tests with no recorded failures. The product showcased a 100% success rate in key capture. In addition, MISI noted that NuRR is both secure and easy to implement, even by a junior engineer. The report further added that the product “did not introduce observed system instabilities during test. NuRR does not open network ports or introduce vulnerabilities into an endpoint as measured by Nmap and BitDefender Total Security.”

    The conclusion of the MISI report noted, “MISI is excited about this product and believes it shows real promise. Decryption is arguably one of the fastest and lowest data-loss means to recover data from a ransomware attack and, as such, represents a new potential layer of defense. Given these testing results and the simplicity of the NuRR decryption solution, we feel NuRR represents a very real potential safety-net for organizations to consider.”

    Steve Perkins, CMO and head of product at Nubeva, highlighted the importance of the independent validation and expressed his confidence in the product, “We knew obtaining third-party validation was crucial to prove the viability of our technology for the broader audience. With this validation, we have proof to support our claims. We can help organizations. We can help people. We can decrypt ransomware.”

    Found this news interesting? Follow us on Twitter  and Telegram to read more exclusive content we post.

    Post Views: 61

    Related Posts

    • Indian APT Group ‘Bahamut’ Employing Fake Android App to Steal Signal and WhatsApp User Data
    • Ukrainian Authorities Detect Russian Hacker Campaign Seeking Evidence of War Crimes
    • Linux Flaw CVE-2023-4911 Sparks Frenzy: Exploits Circulating for Root Access on Major Distros
    • Chinese hackers targeted at least 17 countries across Asia, Europe and North America
    Follow on Google News
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Add A Comment
    Leave A Reply Cancel Reply

    Recent Post

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024

    Top 7 Open-Source LLMs for 2024 and Their Uses

    July 18, 2024
    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Latest

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024
    Popular Post

    Microsoft Enhances Windows 11 Security with Kerberos Authentication Over NTLM Protocol

    October 15, 202318 Views

    Malicious Ads Exploit macOS Users, Unleashing Stealer Malware

    April 1, 202418 Views

    New Nitrogen malware pushed via Google Ads for ransomware attacks

    July 27, 2023222 Views
    • Contact Us
    • About US
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2026 Notesleu. Designed by NIM.

    Type above and press Enter to search. Press Esc to cancel.