Cyber security news for all

More

    Check Point is tracking down a new scam of cyber criminals

    A new “double extortion” ransomeware tactic has been discovered by Check Point, in which threat actors add an additional stage to a ransomware attack.

    Blackmail by unknown cyber criminals is an acute threat to companies of all sizes. But hackers don’t stop at administrations and government bodies either. Only a comprehensive approach to security offers reliable protection against the ubiquitous threat of ransomware. Check Point Software has discovered a new approach by cyber criminals. They pull a second level into their ransomware attacks and make the ransom demand a double extortion.

    Until now, it has been customary to infiltrate the systems of a company with ransomware and to encrypt all important files and servers in order to bring operations to a standstill. Money was requested to release the systems. Those who did not pay were not given the encryption key.

    The offer of complete ransomware solutions enables more and more criminals, who themselves do not have in depth IT skills to use the ransomware. Those who start looking for such offers do not have to go online .The remuneration for the service is often based on the principle that the ransom extortioned goes to the malware seller.

    A Second Level Has Been Seized

    The attackers steal some sensitive data before encryption and threaten to publish it in the course of the ransom demand. Sometimes even a little warning shot follows. Small parts are already revealed.

    Cyber ​​Attack On Companies

    In the course of the investigation, the researchers at the security provider have gained numerous insights into the actions of cyber criminals. The hackers initially attacked public web servers with automatic and manual vulnerability detection. As soon as the attackers had a server under control, it was used to spy on further victims. The Check Point team claims to have found clues for manual online hacking as well as for an automated infection mechanism.

    Recent Articles

    macOS Trojans: Traces lead to Vietnam

    Security researchers have discovered a new macOS Trojans. Behind this could be a well known hacker group that has spied on Vietnamese dissidents in...

    Court forces Tutanota to perform a surveillance function

    Tutanota email only stores its user mails in encrypted form and cannot read them itself. Tutanota is one of the few email providers that...

    Manchester United have been blackmailed by cyber attackers

    The Premier League club Manchester United fell victim to a cyber attack according to the Daily Mail. The cyber criminals are apparently demanding ransom in...

    TikTok has fixed a serious security gap issue

    TikTok accounts paid a researcher a reward of 4000 dollars after he reported two vulnerabilities as part of a disclosure. A combination of both...

    Passwords should be changed for Fortinet VPNs

    Administrators should change the access for Fortinet VPNs in use. Log-in information for almost 50,000 VPN networks has appeared in various cyber blogs. A security...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox