Close Menu
    Facebook X (Twitter) Instagram
    Sunday, November 9
    Facebook X (Twitter) Instagram
    SecurNerd
    • Home
    • General News
    • Cyber Attacks
    • Threats
    • Vulnerabilities
    • Cybersecurity
    • Contact Us
    • More
      • About US
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
    SecurNerd
    Home»Cybersecurity»Independent Lab Validates Nubeva’s Innovative Ransomware Key Interception and Decryption Technology
    Cybersecurity

    Independent Lab Validates Nubeva’s Innovative Ransomware Key Interception and Decryption Technology

    securnerdBy securnerdJuly 26, 2023No Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Nubeva, a tech company headquartered in San Jose, California, has developed a unique product, NuRR (Nubeva Ransomware Reversal), touted to capture encryption keys at the onset of a ransomware’s encryption operation. If successful, the captured keys can be used to decrypt any files encrypted by the ransomware, eliminating the need to pay a ransom.

    The Maryland Innovation & Security Institute’s (MISI) DreamPort facility conducted a thorough evaluation of these claims. MISI, a non-profit aimed at advancing discovery, education, innovation, and collaboration in cybersecurity, formed the DreamPort facility in alliance with the US Cyber Command (USCYBERCOM). Although not directly governed by the government, one of MISI’s fundamental tenets is offering independent validation of product claims for governmental use.

    The NuRR technology works by operating a small agent quietly in the background on each endpoint. Triggered by the earliest signs of unusual or mass encryption, it captures and extracts the encryption keys from the process.

    However, NuRR is not a solution for ransomware prevention; companies still require robust prevention systems. NuRR serves as a safety net when these prevention systems fail.

    MISI conducted the testing at DreamPort for a period of four weeks, during which numerous popular ransomware variants were set off on Windows endpoints where NuRR was installed. It’s important to note that during this process, Nubeva maintained no connection or relationship with MISI.

    The key objective of the tests was to scrutinize NuRR’s capacity to seize ransomware cryptographic keys and verify if Nubeva’s decryptors could subsequently restore the encrypted data. The variants used for this purpose included Lockbit 3, Blackcat/ALPHV, CL0P, PLAY, Black Basta, Ragnar Locker, Conti, REvil, among others—collectively representing a significant proportion of real attacks over the past year.

    The findings, published in July 2023, revealed NuRR’s remarkable performance across all 17 of MISI’s tests with no recorded failures. The product showcased a 100% success rate in key capture. In addition, MISI noted that NuRR is both secure and easy to implement, even by a junior engineer. The report further added that the product “did not introduce observed system instabilities during test. NuRR does not open network ports or introduce vulnerabilities into an endpoint as measured by Nmap and BitDefender Total Security.”

    The conclusion of the MISI report noted, “MISI is excited about this product and believes it shows real promise. Decryption is arguably one of the fastest and lowest data-loss means to recover data from a ransomware attack and, as such, represents a new potential layer of defense. Given these testing results and the simplicity of the NuRR decryption solution, we feel NuRR represents a very real potential safety-net for organizations to consider.”

    Steve Perkins, CMO and head of product at Nubeva, highlighted the importance of the independent validation and expressed his confidence in the product, “We knew obtaining third-party validation was crucial to prove the viability of our technology for the broader audience. With this validation, we have proof to support our claims. We can help organizations. We can help people. We can decrypt ransomware.”

    Found this news interesting? Follow us on Twitter  and Telegram to read more exclusive content we post.

    Post Views: 55
    Featured Ransomware
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleYamaha confirms cyberattack after multiple ransomware gangs claim attacks
    Next Article Cybersecurity and Infrastructure Security Agency Report: Over Half of Cyberattacks Involve Legitimate Credentials
    securnerd
    • Website
    • Facebook
    • X (Twitter)
    • Instagram

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Related Posts

    Python June 23, 2024

    PyQt Mastery: From Beginner to Advanced

    June 23, 2024
    General News June 10, 2024

    Why Apple is introducing “post-quantum encryption” to iMessage

    June 10, 2024
    AI June 9, 2024

    Learn AI by yourself! Recommended AI study and learning methods that beginners won’t be discouraged by!

    June 9, 2024
    Add A Comment
    Leave A Reply Cancel Reply

    Join the Community
    Recent Post

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024

    Top 7 Open-Source LLMs for 2024 and Their Uses

    July 18, 2024
    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Latest

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024
    Popular Post

    Ukraine Enhances Wartime Efforts Through Advanced Cyber Intelligence Strategies

    August 10, 20235 Views

    A Mild, Sweet Fruit With a Fibrous Center

    September 6, 20230 Views

    For Good Results Must Be Make Good Plan

    September 6, 20230 Views

    Mistakes You Might Be Making With Your Watch

    September 6, 20231 Views

    Top Men’s Fashion Trends From Spring

    September 6, 20230 Views

    Surprising Benefits of Honeydew Melon

    September 6, 20230 Views

    Spicy Crispy Chicken Burger Recipe

    September 6, 20230 Views

    Apple’s Recent Vulnerabilities Exploited to Attack Ex-Egyptian MP using “Predator” Malware

    September 23, 202336 Views

    Ethos Technologies Data Breach Settlement Offers Compensation of Up to $5,200 for Affected Individuals

    September 23, 20236 Views

    New Sophisticated and Modular ‘Deadglyph’ Malware Unleashed in Government Cyberattacks

    September 24, 20234 Views
    Facebook X (Twitter) Instagram Pinterest
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.