{"id":52010,"date":"2016-08-15T17:47:32","date_gmt":"2016-08-16T00:47:32","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=52010"},"modified":"2025-05-28T23:10:39","modified_gmt":"2025-05-29T06:10:39","slug":"cerber-ransomware-updates-configuration-file","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-updates-configuration-file\/","title":{"rendered":"Cerber Ransomware Updates Configuration File"},"content":{"rendered":"<p><em>This blog post was written by Sudhanshu Dubey.<\/em><\/p>\n<p>McAfee Labs has recently analyzed Version 2 of Cerber, one of the leading ransomware programs. Cerber infects systems via social media tricks such as spam email with malicious links or documents, malvertising campaigns, exploits of vulnerable websites, and also takes advantages of exploit kits like Angler, Nuclear, and others.<\/p>\n<p>During our analysis of the new version, we found some new fields in the configuration file. In this post, we highlight the changes in the configuration files of Cerber Versions 1 and 2.<br \/>\nThis snapshot shows a machine infected with Cerber 2.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-52025 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-1.png\" alt=\"20160815 Cerber 1\" width=\"1479\" height=\"659\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160815-Cerber-1.png 1479w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160815-Cerber-1-300x134.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160815-Cerber-1-768x342.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160815-Cerber-1-1024x456.png 1024w\" sizes=\"auto, (max-width: 1479px) 100vw, 1479px\" \/><\/a><\/p>\n<p><em>Machine infected with Cerber Version 2.<\/em><\/p>\n<p>The extensions of encrypted files has changed from .cerber to .cerber2.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-52024 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-2.png\" alt=\"20160815 Cerber 2\" width=\"234\" height=\"217\" \/><\/a><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-52023 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-3.png\" alt=\"20160815 Cerber 3\" width=\"258\" height=\"212\" \/><\/a><\/p>\n<p><em>Partial lists of files infected with Cerber 1 and 2.<\/em><\/p>\n<h2><strong>Why an update?<\/strong><\/h2>\n<p>The ransomware author may have upgraded the malware because of the release of a decryption tool. The ransomware\u2019s detection rate may have also increased; this version has a new packer (wrapper) to make it harder for security products and analysts to find and examine the malware.<\/p>\n<p>Our analysis did not find many significant changes. This version likes to keep its component files (containing the public key and other data) on disk after the encryption process, whereas the previous version kept the component files only in the registry entries. Files and registry entries have the same content.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-52022 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-4.png\" alt=\"20160815 Cerber 4\" width=\"665\" height=\"418\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160815-Cerber-4.png 665w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160815-Cerber-4-300x189.png 300w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/><\/a><\/p>\n<p><em>Version 2\u2019s component files in %appdata% and registry entries.<\/em><\/p>\n<p>The location of the encrypted configuration file is updated from the resource section to the last section. We will discuss this further in a future post.<\/p>\n<h2><strong>The configuration file<\/strong><\/h2>\n<p>We observed some changes in the configuration files of the two versions. Most are related to encryption tags and antimalware products.<\/p>\n<p>The first change that caught our eye is the addition of rc4_key_size in the encrypt tag. This value was previously calculated at runtime but now is included in the file. The author also updated the infected-files extension to .cerber2 and also modified the value of the rsa_key_size field. The following snippets show some of the changes.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-52021 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-5.png\" alt=\"20160815 Cerber 5\" width=\"258\" height=\"144\" \/><\/a><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-52020 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-6.png\" alt=\"20160815 Cerber 6\" width=\"262\" height=\"158\" \/><\/a><\/p>\n<p><em>Version 1 (left) and Version 2 encryption tags.<\/em><\/p>\n<p>Version 2 includes a blacklist to fight against the security products. The av_blacklist tag in the configuration file contains a list of several vendors\u2019 names.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-7.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-52019 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-7.png\" alt=\"20160815 Cerber 7\" width=\"723\" height=\"87\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160815-Cerber-7.png 723w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160815-Cerber-7-300x36.png 300w\" sizes=\"auto, (max-width: 723px) 100vw, 723px\" \/><\/a><\/p>\n<p><em>Version 2\u2019s av_blacklist tag.<\/em><\/p>\n<p>The new av_blacklist tag is reflected in the check tag as a flag in the configuration file.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-8.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-52018 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-8.png\" alt=\"20160815 Cerber 8\" width=\"597\" height=\"40\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160815-Cerber-8.png 597w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160815-Cerber-8-300x20.png 300w\" sizes=\"auto, (max-width: 597px) 100vw, 597px\" \/><\/a><\/p>\n<p><em>Check tag in Version 1.<\/em><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-9.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-52017 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-9.png\" alt=\"20160815 Cerber 9\" width=\"625\" height=\"35\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160815-Cerber-9.png 625w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160815-Cerber-9-300x17.png 300w\" sizes=\"auto, (max-width: 625px) 100vw, 625px\" \/><\/a><\/p>\n<p><em>Check tag in Version 2.<\/em><\/p>\n<p><strong>Close_process list enhancements<\/strong><\/p>\n<p>Some applications use a locking mechanism to prevent other application from accessing or making changes in the files they access to maintain data integrity. Word for Windows does this, for example. To stop a locking mechanism from preventing the encryption of files, Cerber terminates such processes. The list of these processes is kept under the close_process list tag. In this version, Cerber enhances this list significantly, as shown below:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-10.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-52016 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-10.png\" alt=\"20160815 Cerber 10\" width=\"762\" height=\"44\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160815-Cerber-10.png 762w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160815-Cerber-10-300x17.png 300w\" sizes=\"auto, (max-width: 762px) 100vw, 762px\" \/><\/a><\/p>\n<p><em>The close_process tag in Version 1.<\/em><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-11.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-52015 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-11.png\" alt=\"20160815 Cerber 11\" width=\"685\" height=\"53\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160815-Cerber-11.png 685w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160815-Cerber-11-300x23.png 300w\" sizes=\"auto, (max-width: 685px) 100vw, 685px\" \/><\/a><\/p>\n<p><em>The close_process tag in Version 2.<\/em><\/p>\n<p><strong>Wallpaper template<\/strong><br \/>\nVersion 2 adds a wallpaper tag, which is a template to create the desktop background on the victim\u2019s machine. The variable fields\u2014including TOR, SITE_N, and PC_ID\u2014is updated at runtime.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-12.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-52014 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-12.png\" alt=\"20160815 Cerber 12\" width=\"661\" height=\"410\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160815-Cerber-12.png 661w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160815-Cerber-12-300x186.png 300w\" sizes=\"auto, (max-width: 661px) 100vw, 661px\" \/><\/a><\/p>\n<p><em>The wallpaper tag in Version 2.<\/em><\/p>\n<p><strong>Anti-VM techniques<\/strong><br \/>\nCerber is one of the most comprehensive malware in fighting virtual machines. Cerber detects popular VMs such as Parallel, QEMU, VMware, and VBox. One of the most interesting techniques (in both versions) is Cerber\u2019s enumeration of the registry key \u201cHKLM\\\\SYSTEM\\\\CurrentControlSet\\\\Enum\\\\PCI\u201d:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-13.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-52013 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-13.png\" alt=\"20160815 Cerber 13\" width=\"971\" height=\"119\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160815-Cerber-13.png 971w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160815-Cerber-13-300x37.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160815-Cerber-13-768x94.png 768w\" sizes=\"auto, (max-width: 971px) 100vw, 971px\" \/><\/a><br \/>\n<em>Accessing the registry: HKLM\\\\SYSTEM\\\\CurrentControlSet\\\\Enum\\\\PCI.<\/em><\/p>\n<p>Each subkey of HKLM\\\\SYSTEM\\\\CurrentControlSet\\\\Enum\\\\PCI represents a PCI-bus connected device with the following format:<\/p>\n<ul>\n<li>VEN_XXXX&amp;DEV_XXXX&amp;SUBSYS_XXXXXXXXX&amp;REV_XX<br \/>\nwhere VEN stands for Vendor ID in hexadecimal view and DEV stands for Device ID in hexadecimal view.<\/li>\n<\/ul>\n<p>A table of virtual machines with known hardware vendor IDs:<\/p>\n<table width=\"156\">\n<tbody>\n<tr>\n<td width=\"78\"><strong>Vendor<\/strong><\/td>\n<td width=\"156\"><strong>Vendor ID<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"78\">VMware<\/td>\n<td width=\"156\">0x15AD<\/td>\n<\/tr>\n<tr>\n<td width=\"78\">VBox<\/td>\n<td width=\"156\">0x80EE<\/td>\n<\/tr>\n<tr>\n<td width=\"78\">Parallel<\/td>\n<td width=\"156\">0x1AB8<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The following code snippet compares the subkey name with the VBox vendor ID.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-14.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-52012 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-14.png\" alt=\"20160815 Cerber 14\" width=\"492\" height=\"68\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160815-Cerber-14.png 492w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160815-Cerber-14-300x41.png 300w\" sizes=\"auto, (max-width: 492px) 100vw, 492px\" \/><\/a><br \/>\n<em>Checking the VBox vendor ID.<\/em><\/p>\n<p>If Cerber finds any of the vendor IDs among registry key names, it stops and terminates itself.<\/p>\n<h2><strong>Summary<\/strong><\/h2>\n<p>Cerber is a popular form of ransomware. Given the changes we have observed in the configuration file, we also expect to see change in Cerber\u2019s encryption techniques. We\u2019ll discuss those soon in a further analysis.<\/p>\n<p>McAfee products detect Cerber under generic names such as Generic.* and BehavesLike.Win32.*.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This blog post was written by Sudhanshu Dubey. McAfee Labs has recently analyzed Version 2 of Cerber, one of the&#8230;<\/p>\n","protected":false},"author":695,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1814,76,338,180,4549],"coauthors":[4136],"class_list":["post-52010","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-computer-security","tag-cybercrime","tag-endpoint-protection","tag-malware","tag-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cerber Ransomware Updates Configuration File | McAfee Blog<\/title>\n<meta name=\"description\" content=\"This blog post was written by Sudhanshu Dubey. McAfee Labs has recently analyzed Version 2 of Cerber, one of the leading ransomware programs. Cerber\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cerber Ransomware Updates Configuration File | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"This blog post was written by Sudhanshu Dubey. McAfee Labs has recently analyzed Version 2 of Cerber, one of the leading ransomware programs. Cerber\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-updates-configuration-file\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-16T00:47:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-29T06:10:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160815-Cerber-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1479\" \/>\n\t<meta property=\"og:image:height\" content=\"659\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-updates-configuration-file\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-updates-configuration-file\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Cerber Ransomware Updates Configuration File\",\"datePublished\":\"2016-08-16T00:47:32+00:00\",\"dateModified\":\"2025-05-29T06:10:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-updates-configuration-file\/\"},\"wordCount\":740,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-updates-configuration-file\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-1.png\",\"keywords\":[\"computer security\",\"cybercrime\",\"endpoint protection\",\"malware\",\"ransomware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-updates-configuration-file\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-updates-configuration-file\/\",\"name\":\"Cerber Ransomware Updates Configuration File | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-updates-configuration-file\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-updates-configuration-file\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-1.png\",\"datePublished\":\"2016-08-16T00:47:32+00:00\",\"dateModified\":\"2025-05-29T06:10:39+00:00\",\"description\":\"This blog post was written by Sudhanshu Dubey. McAfee Labs has recently analyzed Version 2 of Cerber, one of the leading ransomware programs. Cerber\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-updates-configuration-file\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-updates-configuration-file\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-updates-configuration-file\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-1.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-updates-configuration-file\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cerber Ransomware Updates Configuration File\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cerber Ransomware Updates Configuration File | McAfee Blog","description":"This blog post was written by Sudhanshu Dubey. McAfee Labs has recently analyzed Version 2 of Cerber, one of the leading ransomware programs. Cerber","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Cerber Ransomware Updates Configuration File | McAfee Blog","og_description":"This blog post was written by Sudhanshu Dubey. McAfee Labs has recently analyzed Version 2 of Cerber, one of the leading ransomware programs. Cerber","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-updates-configuration-file\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-08-16T00:47:32+00:00","article_modified_time":"2025-05-29T06:10:39+00:00","og_image":[{"width":1479,"height":659,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20160815-Cerber-1.png","type":"image\/png"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-updates-configuration-file\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-updates-configuration-file\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Cerber Ransomware Updates Configuration File","datePublished":"2016-08-16T00:47:32+00:00","dateModified":"2025-05-29T06:10:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-updates-configuration-file\/"},"wordCount":740,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-updates-configuration-file\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-1.png","keywords":["computer security","cybercrime","endpoint protection","malware","ransomware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-updates-configuration-file\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-updates-configuration-file\/","name":"Cerber Ransomware Updates Configuration File | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-updates-configuration-file\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-updates-configuration-file\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-1.png","datePublished":"2016-08-16T00:47:32+00:00","dateModified":"2025-05-29T06:10:39+00:00","description":"This blog post was written by Sudhanshu Dubey. McAfee Labs has recently analyzed Version 2 of Cerber, one of the leading ransomware programs. Cerber","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-updates-configuration-file\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-updates-configuration-file\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-updates-configuration-file\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-1.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20160815-Cerber-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cerber-ransomware-updates-configuration-file\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Cerber Ransomware Updates Configuration File"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/52010","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=52010"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/52010\/revisions"}],"predecessor-version":[{"id":214672,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/52010\/revisions\/214672"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=52010"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=52010"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=52010"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=52010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}