In late July, Governor John Bel Edwards of Louisiana declared a State of Emergency citing “there has been severe, intentional cybersecurity breaches in Louisiana school systems that may potentially compromise other private and public entities throughout the State”. The announcement followed a series of cyber attacks against three major school districts in the state, generating panic and fear amongst the educational community around the nation. Ransomware attacks further victimized school districts in Connecticut, Alabama, New Mexico, amongst a growing […]
Reports point to Sodinokibi ransomware for using exploits from a previous Microsoft Windows zero-day vulnerability.
In the Spring of 2019, a new ransomware variant dubbed Sodinokibi (also known as REvil, Sodi, Sodin) started infecting computers with malware, encrypting user data and demanding a ransom in the form of Bitcoin. Sodinokibi first began by capitalizing on an Oracle WebLogic deserialization vulnerability in which allowed remote code execution over a network without the need for proper authentication such as usernames and passwords. […]
Since first emerging in January of 2018, the GandCrab ransomware variants have affected more than 1.5 million users of the Windows Operating System, and the cyber criminal organization claiming they received more than $2 billion in ransomware extortion payments.
In June of 2019, the organization behind the infamous ransomware GandCrab announced in an online forum that they are ceasing operations and will not be providing any further decryptions and variants. First released on January 28, 2018, GandCrab ransomware is considered […]
Proven Data has been and will continue to be a pioneer in the ransomware remediation and recurrence prevention. Ransomware is a type of malware that locks up files and demands payment usually in the form of bitcoin. The files are not unlocked until a key is obtained from the threat actor after making payment.
Ransomware continues to be a major threat affecting organizations and their networks of all sizes, and Proven Data stands by our clients with the intent […]
It has not even been a year since Cryptowall 3.0 was discovered and now there is a new version, Cryptowall 4.0 and it is more devious and demented than its former version. Released and targeted worldwide, Cryptowall 4.0 has many elements of before but now has improved communication capabilities and has included a more resilient cloaking segment so that it is a lot more challenging to protect against. Cryptowall data recovery has never been more complicated.
It is bad enough […]
There is a recently discovered ransomware called “Adult Player” that is making its rounds for Android users. The devilish software acts like a porn app, however, when you download it to your phone it begins taking pictures of you, blocks your device and then demands a ransom amount of $500. Downloading random APK files is a major warning, however, for those that are naïve and believe they are accessing a free Android porn app, they are in for a […]
With the launch of Windows 10 come the usual love-hate anticipation of new features, combined with the usual bugs and fixes. The release has been scheduled for quite some time, and this has given the dark side of the cyber world a sufficient alert to create a CBT-locker brand ransomware to take advantage of the innocent and unaware. The announcement of a ‘free upgrade’ by Microsoft has led to new operating installations in over 190 countries and following close-on-the-heels […]
The DoJ announced that the Internet Crime Complaint Center (IC3) had received roughly 7,750 public complaints regarding ransomware since 2005, with an estimated $57.6 million in damages. The costs come from ransoms paid in addition to the associated cost of lost data.
Cyber threats are continuing to escalate through the use of Ransomware virus invasions. The sophistication of the programs take viruses to a new level as entire computers and networks have their critical files encrypted and then held ‘ransom’ […]
The mere term of ‘cybercrime’ sends chills down the spines of every IT Department member. It is the topic of discussion in closed door meetings, where only the strong dare attend, which include conversations of system reinforcement and watchful diligence. Cyber hacking has taken a different twist in the last few years with the introduction of a particularly nasty form called ‘ransomware’. These cyber criminals don’t try to hide the fact that they have attacked your system, instead they […]