Security Awareness Training Blog

Keeping You Informed. Keeping You Aware.

Report: 85% of Ransomware Victims Get Taken Offline For A Week or More [INFOGRAPHIC]

New research reveals that the majority of ransomware victims (85 percent) had their systems taken offline for at least a week, costing businesses thousands in financial damage each day.

MySQL instances attacked by database blackmailers

Copycats delete databases without dumping them first.

Internet-facing instances of the popular MySQL information store are being targeted by attackers following similar attacks on insecure databases earlier this year.

Security vendor GuardiCore this month spotted hundreds of attacks emanating from a Dutch web hosting company. 

Hackers Demand $25K-$30K After Ransomware Attack Takes Down Bingham County Servers

BLACKFOOT — Bingham County officials are scrambling to rebuild parts of their computer infrastructure after a ransomware attack took down county servers on Wednesday. The Bingham County IT team is pulling all-nighters to recover their systems. 

Are There Free Ransomware Decryptors?

The threat of ransomware has never been more real. In fact, 2016 was a record year. Here are some scary statistics from the past year put together by the folks at Barkly:

  • Nearly 50 percent of organizations have been hit with ransomware
  • 56,000 ransomware infections in March 2016, alone
  • $209 million was paid to ransomware criminals just in Q1 2016
  • The average ransom demand is now $679

If you're reading this, we're guessing you've been hit and you're probably wondering what to do next. 

Every strain has its own unique ransom note but the message boils down to the cybercriminals telling you it's your money or your files. It doesn't have to be that way! Security pros are constantly trying to stay a step ahead of threat actors developing the ransomware, but it's a never-ending cycle. That said, there are free decryptors you can try for several different strains. 

[ALERT] DynA-Crypt Ransomware Steals And Deletes Your Data

Our friend Larry Abrams at Bleepingcomputer alerted the world about a new strain of ransomware called DynA-Crypt that was put together using a malware creation kit by people that are not very experienced, but have a lot of destruction in mind.

CRYSIS Ransomware Is Back And Uses RDP Brute Force To Attack U.S. Healthcare Orgs

Remember the CRYSIS ransomware? The attacks started up again, mostly targeting US healthcare orgs. using brute force attacks via Remote Desktop Protocol (RDP).  

The number of attacks has more than doubled in volume in January 2017 over that same timeframe in 2016. This most recent wave included a wide variety of sectors worldwide, but the U.S. healthcare sector was hit the hardest.

Fake Netflix App Is Actually Ransomware

Kaspersky warned on their blog: "People are downloading a new app, looking to get free access to Netflix accounts. What they’re actually getting is a malware strain called Netix that encrypts users’ data and demands $100 in bitcoins to unlock their files." 

Netflix has a 93 million-strong subscriber base in more than 190 countries, so it’s unsurprising that cybercriminals want a piece of the pie.

Careless Licking Gets A Nasty Ransomware Phishing Infection: 1,000+ Machines Down

More than 1,000 government computer systems shut down. A county in Ohio, US, has had to shut down its entire IT infrastructure due to a ransomware infection. County Auditor Mike Smith found a bright side on an otherwise gloomy day.  "Apparently, our clock still works."

Ransomware attacks quadrupled in 2016, expected to double again in 2017

The number of ransomware attacks quadrupled in 2016 and are expected to double again in 2017, according to findings in a report from large insurer Beazley. They suggested that organisations appear to be particularly vulnerable to attacks during IT system freezes, at the end of financial quarters and during busy shopping periods.

Ransomware Infection Causes Loss of 8 Years Of Police Department Evidence

The Police Department in Cockrell Hill, Texas released in a press release that they lost 8 years worth of evidence after the department's server was infected with ransomware.

Subscribe To Our Blog

Phish Your Users

Get the latest about social engineering

Subscribe to CyberheistNews