Encryption, Exfiltration, and Extortion are the Name of the Game as PSYA Ransomware Attacks on Education Organizations Increase



Encryption, Exfiltration, and Extortion for PSYA RansomwareA new warning from the FBI highlights an aggressive campaign of ransomware attacks targeting higher education, K-12 schools, and seminaries, providing specific attack details.

Within the cybercrime ecosystem, there will be criminal organizations that specialize in targeting certain organizations. Perhaps the bad guys are great at social engineering a certain industry, or maybe the target organization type has a particular security profile that is easier to bypass. Whatever the reason, we’re seeing more cybercriminal orgs begin to specialize.

A new warning from the FBI is directed at educational institutions, cautioning them of targeted attacks using PSYA ransomware. According to the FBI, PSYA typically gains unauthorized access to victim networks via either Remote Desktop Protocol (RDP) access and/or through phishing.

Once inside the victim network, PSYA threat actors use native and freeware tools to exfiltrate files from the victim’s network, and then encrypt all connected Windows and/or Linux devices and data “rendering critical files, databases, virtual machines, backups, and applications inaccessible to users.”

The FBI recommends regular backups, network segmentation, use of multi-factor authentication, disabling Internet-facing RDP, keep systems updated, and to focus on Security Awareness Training.


RanSim

Free downloadable software tool

Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

RanSim gives you a quick look at the effectiveness of your existing network protection. RanSim will test 24 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

RansIm-Monitor3Here's how it works:

  • 100% harmless simulation of real ransomware and cryptomining infections
  • Does not use any of your own files
  • Tests 25 types of infection scenarios
  • Just download the installer and run it
  • Results in a few minutes!

Get RanSim!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

https://www.knowbe4.com/ransim

Topics: Ransomware



Subscribe to Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews