Skip to main content

Posts

Showing posts from June, 2020

How to protect against ransomware attacks

How to protect against ransomware attacks Regardless of your industry, any serious minded company should have a proper cybersecurity plan and remediation strategy to protect against and handle ransomware attacks. As most ransomware attacks infect and encrypt files, backing up data may seem like a good starting point to minimise the impact of an attack. However, be aware that more advanced types of ransomware can also encrypt backup files, so you won’t be able to restore these versions on to your computers. You should also keep your company’s operating system up to date and install antivirus and whitelisting software on all computers. Antivirus software will detect malware and ransomware threats as they arrive, while whitelisting software will prevent unauthorised software from opening. These software and computer updates will help protect your company from a wide range of cyber threats. However, antivirus software can only go so far in protecting against cyber-attacks. In fa...

Ransom X Ransomeware attacks Texas Department of Transportation TxDOT

Ransom X Ransomeware attacks Texas Department of Transportation TxDOT RansomX is a new ransomware used actively in human-operated and targeted attacks against government agencies and enterprises. In May 2020 two Texas state agencies were attacked, the Texas Court and the Texas Department of Transport(TxDOT) were hit by a ransomware attack. At the time of the attacks , it was not known what ransomware targeted the agencies RANSOM X This is a human-operated ransomeware, rather than one distributed via phishing or malware, when executed the ransomware will open a console that displays information to the attacker while it is running. This ransware bypass various windows system folders and any files that match the follow extensions: .ani, .cab, .cpl, .cur, .diagcab, .diagpkg, .dll, .drv, .hlp, .icl, .icns, .ico, .iso, .ics, .lnk, .idx, .mod, .mpa, .msc, .msp, .msstyles, .msu, .nomedia, .ocx, .prf, .rtp, .scr, .shs, .spl, .sys, .theme, .themepack, .exe, .bat, .cmd, .url, .mu...

Massive Cyberattack on Australia Uses Cryptojacking Exploits

Massive Cyberattack on Australia Uses Cryptojacking Exploits The Australian Cyber Security Centre said a group of “state actors” hacked Australian networks on June 19 and one of the vulnerabilities they exploited is related to cryptojacking malware attacks.  According to the 48-page  report  released on June 24, the threat actors exploited four critical vulnerabilities in Telerik UI, including  CVE-2019-18935 , which was recently leveraged by the Blue Mockingbird malware gang to infect thousands of systems with XMRRig, a Monero (XMR) mining software. Vulnerability mostly used for cryptojacking purposes Although the advisory didn’t say if hackers could have installed cryptojacking malware during the recent massive cyberattack, such vulnerability is the preferred one for the cybercriminals for installing crypto-mining applications within corporate networks.  The report elaborates on the CVE-2019-18935 vulnerability, which also has similari...