A new ransomware that appends .wallet to the end of encrypted files has appeared over the last couple of weeks. After further research, it has been determined that this is a newer variant of CrySiS ransomware called Dharma.
In 2016, several hospitals and healthcare organizations were hit with ransomware attacks. In fact, between October 2016 and February 2017, 42.77% of cyberattacks targeted healthcare organizations. With ransomware attacks predicted to quadruple by 2020, cybersecurity spending is also predicted to exceed $65 billion for the healthcare industry.
March was a month where a lot of small ransomware variants appeared but never came to fruition. There was, however, an update on CryptoLocker making its return, Cerber added a couple of new features, and Android ransomware appears to be here to stay. We also have a list of decryptors that were released, enabling you to recover your files without paying the ransom.
We recently had an individual inquire about a form of ransomware named Matrix. Unfortunately, there is currently no way to decrypt files that are encrypted by the Matrix ransomware without paying the ransom. We have included that transcript of the conversation between our Security Analyst and the tech who has had a client infected by Matrix. Too many of our conversations go this way. Having CryptoStopper would have prevented this and having CryptoStopper in your cyber security arsenal will prevent this from happening to you.
A new ransomware variant named ‘Kirk’ after popular Star Trek character James. T. Kirk recently hit the cybersecurity scene. Like most forms of ransomware, Kirk Ransomware immediately starts encrypting a victim’s files once the malware has been installed. Besides the Star Trek theme, the most interesting characteristic of Kirk Ransomware is the currency demanded for the ransom payment, Monero.
A zero-day attack named Double Agent has been discovered that exploits a 15-year-old feature in Windows from XP through Windows 10. The attack has the ability to take over antivirus software on machines running Windows and turns them into a weaponized Trojan capable of attacking the very system it was designed to protect.
While no one wants to be hit with ransomware, the fact is that one in two businesses will be infected with some type of ransomware in 2017. Knowing where to find a possible antidote or decrypter can be a vital part of recovering your encrypted files without paying a ransom.
Phishing is one of the most common attack vectors hackers use to initially infiltrate a user’s system. Phishing is an attempt to obtain user credentials, financial data, or other sensitive information by emulating a legitimate email communication. Phishing emails can also be used to trick a user into clicking on a malicious attachment or link that is embedded into an email. Spear phishing, on the other hand, is a targeted phishing campaign where hackers first research their target individual or company to increase their chance of success. By doing this, hackers attempt to appear more trustworthy as a legitimate business entity thus making the target less suspicious. Spear phishing presents a much greater threat than phishing in general as the targets are often high-level executives of large corporations.
WikiLeaks dropped a bombshell on Tuesday, March 7th when it began a new series of leaks on the U.S. Central Intelligence Agency. Code-named Vault 7, Year Zero is the first series and is comprised of 8,761 documents and files from inside the Central Intelligence Agency’s (CIA) high-security network. Below are 7 revelations from Vault 7.
Advanced Persistent Threats (APT) and ransomware have been the most dreaded types of malware over the last couple of years. While there are clear and distinct differences between APTs and ransomware, we are now seeing the two being paired together to create a type of hybrid malware.