[Interpol Alert] LockBit Ransomware Attacks Affect American SMB's



lockbit ransomware attackIf you thought LockBit ransomware has gone away, think again. According to a recent report from Interpol, the impact of COVID-19 on cybercrime has taken shape and LockBit operators are targeting American SMB's.

The report generated by Interpol's Cybercrime Directorate includes data from 48 Interpol countries and 4 private partners. This analysis was also from Interpol's Cybercrime Threat Response and its Cyber Fusion Centre. The International Criminal Police Organization (Interpol) says [PDF] that "a ransomware campaign carried out mainly through LOCKBIT malware is currently affecting medium-sized companies in some countries within this region."

LockBit is a human-operated Ransomware-as-a-Service (RaaS) operation that surfaced in September 2019 as a private operation targeting enterprises and later observed by Microsoft while targeting healthcare and critical services. This ransomware strain's operators use the publicly available CrackMapExec penetration testing tool to move laterally once they get a foothold on a victim's network.

Two months ago, LockBit partnered with Maze ransomware's operators to create an extortion cartel that allows them to share the same data leak platform during their operations and to exchange tactics and intelligence.

Based on their analysis, CERBER, NetWalker, and Ryuk were the top ransomware families recently detected by Interpol private partners and they are seen as "constantly evolving to maximize the potential damage of a single attack as well as the financial profit for its perpetrators."

"In the first two weeks of April 2020, there was a spike in ransomware attacks by multiple threat groups which had been relatively dormant for the past few months," the Interpol added. "This implies that there may still be organizations that have been infected but where the ransomware has not yet been activated."

Interpol recommends organizations exposed to ransomware attacks to keep their software and hardware up to date, and to back up their data using offline storage devices to block ransomware operators from accessing and encrypting them. New-school security awareness training can ensure your users can spot the warning signs of a ransomware attack. 

Bleeping Computer has the full story


RanSim

Free downloadable software tool

Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

RanSim gives you a quick look at the effectiveness of your existing network protection. RanSim will test 24 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

RansIm-Monitor3Here's how it works:

  • 100% harmless simulation of real ransomware and cryptomining infections
  • Does not use any of your own files
  • Tests 25 types of infection scenarios
  • Just download the installer and run it
  • Results in a few minutes!

Get RanSim!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

https://www.knowbe4.com/ransim

Topics: Ransomware



Subscribe to Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews