Encryption, Exfiltration, and Extortion are the Name of the Game as PSYA Ransomware Attacks on Education Organizations Increase

Encryption, Exfiltration, and Extortion for PSYA RansomwareA new warning from the FBI highlights an aggressive campaign of ransomware attacks targeting higher education, K-12 schools, and seminaries, providing specific attack details.

Within the cybercrime ecosystem, there will be criminal organizations that specialize in targeting certain organizations. Perhaps the bad guys are great at social engineering a certain industry, or maybe the target organization type has a particular security profile that is easier to bypass. Whatever the reason, we’re seeing more cybercriminal orgs begin to specialize.

A new warning from the FBI is directed at educational institutions, cautioning them of targeted attacks using PSYA ransomware. According to the FBI, PSYA typically gains unauthorized access to victim networks via either Remote Desktop Protocol (RDP) access and/or through phishing.

Once inside the victim network, PSYA threat actors use native and freeware tools to exfiltrate files from the victim’s network, and then encrypt all connected Windows and/or Linux devices and data “rendering critical files, databases, virtual machines, backups, and applications inaccessible to users.”

The FBI recommends regular backups, network segmentation, use of multi-factor authentication, disabling Internet-facing RDP, keep systems updated, and to focus on Security Awareness Training.

Free Ransomware Simulator Tool

Bad guys are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

KnowBe4’s "RanSim" gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 20 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

RanSimScreen-1Here's how it works:

  • 100% harmless simulation of real ransomware and cryptomining infections
  • Does not use any of your own files
  • Tests 21 types of infection scenarios
  • Just download the install and run it 
  • Results in a few minutes!

Get RanSim!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:


Topics: Ransomware

Subscribe To Our Blog

Ransomware Hostage Rescue Manual

Get the latest about social engineering

Subscribe to CyberheistNews