Saturday, September 26, 22:10
Home security Interpol: "LockBit ransomware targets small and medium enterprises"!

Interpol: "LockBit ransomware targets small and medium enterprises"!

U.S. small and medium-sized businesses have been targeted by LockBit ransomware operators, according to an Interpol report citing the impact of the pandemic. COVID-19 in the field of cybercrime worldwide. The report was prepared by the Interpol Cybercrime Directorate and includes data from 48 Interpol member countries and from 4 private partners, as well as detailed information from This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. Cybercrime Threat Response (CTR) Interpol unit and the Cyber ​​Fusion Center (CFC). Some of the information contained in the report came from private partners and Interpol regional cybercrime working groups.

Interpol

In particular, Interpol reported that a ransomware campaign carried out mainly through LockBit malware, affects US small and medium enterprises. LockBit, a human-operated Ransomware-as-a-Service company, first appeared in September 2019, initially targeting large and small businesses, while later the Microsoft found that this campaign also targeted health as well as other critical ones services.

Operators of this ransomware strain use the commonly available penetration testing tool CrackMapExec to move sideways as soon as they are in a victim's net. Two months ago, LockBit partnered with Maze ransomware operators to create a blackmail cartel that allows them to share the same data leakage platform during their operation and exchange their tactics and information gathered from attacks their. Maze ransomware operators have said they may work with other ransomware gangs to collect huge ransoms from their victims.

Small and medium ransomware businesses

Which ransomware strains have been most active during the pandemic?

Interpol carefully examined the data provided by its partners to determine which were the most aggressive ransomware gangs during the pandemic. Based on the research conducted, CERBER, NetWalker and Ryuk were the top ransomware families recently identified by Interpol partners, with their operators constantly evolving them, aiming to maximize the damage that an individual attack can cause, as well as reap huge financial gains.

In addition, Interpol noted that in the first two weeks of April 2020, there was a significant increase in ransomware attacks from many threats that have been relatively inactive in recent months. This means that there may still be infected organisms, but the ransomware has not yet been activated.

Interpol recently reported on Emotet botnet, noting that 13% of organizations worldwide have been affected by this malware. Ransomware operators are also targeting European healthcare institutions and critical infrastructure involved in the fight against COVID-19, according to an Interpol report. Interpol also warned in April of a wave of ransomware attacks targeting hospitals trying to "lock in" them from critical systems.

ransomware - defense

What protection measures does Interpol propose to defend against ransomware attacks?

Interpol recommends that organizations exposed to ransomware attacks regularly update their software and their hardware, and it is very important that they back up their data using offline storage devices to prevent ransomware operators from accessing and encrypting it. In addition, it advises organizations to take the following safeguards to protect their systems:

  • Open up e-mail and download software / applications only from reliable sources.
  • Do not click on links or open attachments in emails that you did not expect to receive or from an unknown sender.
  • Secure email systems to protect yourself from spam from which you could be "infected".
  • Make regular backups of all important files and save them independently of your system (e.g. in cloud, on an external drive).
  • Make sure you have the latest anti-virus software installed on all systems and mobile devices and that it runs consistently.
  • Use strong, unique passwords for all systems and update them regularly.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Pohackontas
Pohackontashttps://www.secnews.gr
Every accomplishment starts with the decision to try.

LIVE NEWS

How to turn off private Wi-Fi MAC addresses

Apple has changed the way the iPhone and iPad connect to Wi-Fi networks starting with the iOS 14 and iPadOS 14 updates ....

Mac: See how to rename multiple files at once!

Many people have more difficulty renaming files on a Mac than renaming Windows. The Finder of ...

How can you control the performance of your Chromebook?

Many times users wonder about the performance of their computer and would like to be able to take a look at the system ...

How To Detect Hidden Surveillance Cameras With Your Phone

During our holidays or on business trips, we are forced to stay in hotels or Airbnb ....

How to play the hidden game of Android 11

Google usually includes the so-called "Easter Eggs" in every new version of Android that is released. And Android 11 is not ...
00:01:49

Ring: Amazon's new device is a drone with a security camera

Amazon is ready to launch a new Ring security camera mounted on top of a flying drone.

Software developers were very productive during the pandemic

The productivity of most software development teams increased during the Covid-19 pandemic crisis, according to a new study. But if you are ...

Cisco: 25 Serious Defects in IOS and IOS XE Software

Cisco has warned customers using IOS and ISO XE software to apply updates for 25 high-security vulnerabilities ...

The new Microsoft Edge feature will reduce memory and CPU usage

To improve memory and CPU usage on the Edge, Microsoft is developing a new feature called "Sleeping Tabs".

Microsoft: Removed 18 Azure AD apps controlled by Chinese hackers

Microsoft announced yesterday that it has removed 18 Azure Active Directory apps from the Azure portal, which were developed and used maliciously by ...