Security Awareness Training Blog

Ransomware Blog

Keeping you updated on the latest ransomware attack vectors, strains, decryptors, families and trends to help you avoid becoming infected.

ALERT: Ransomware Infection = Official Data Breach

This is one of the rare Cyberheist NewsFlash issues that we send when we run into something important enough to alert you about right away. Please forward to your friends and colleagues.
Continue Reading

Brokerage house Gets Hit With CryptoWall Ransomware

The brokerage house, Benjamin F. Edwards & Co., announced this week that they had suffered a data breach. May 24, 2014 they had their computer systems compromised by an unauthorized ...
Continue Reading

[InfoGraphic] Ransomware Threats Concern Survey

We surveyed over 300 system administrators regarding ransomware, here are the results:
Continue Reading

The Evolution of Mobile Ransomware

Security experts have warned for years that our smartphones are due for a major cyberattack. Like PCs back in the early days -- the 1990s -- mobile phones are largely unprotected by ...
Continue Reading

Prepare yourself for high-stakes cyber ransom

Roger Grimes over at InfoWorld did a great write-up about the state of cyber ransom these days. He also went back in history for a while and gives the factors that have led up to the ...
Continue Reading

New KnowBe4 Survey Shows IT Pros Concern About Ransomware Skyrocketing

Security Awareness Training and Backup Voted Most Effective Solutions to Combat CryptoLocker
Continue Reading

Stand-alone CryptoLocker Variant Found

It looks like the Russian evil genius behind Cryptolocker, Evgeniy Mikhailovich Bogachev, has not been sitting still since the recent international law enforcement "Operation Tovar" which ...
Continue Reading

Finally Some Good News iPhone Ransomware Gang Busted

Finally some good news for a change. John Zorabedian at Sophos reported the following.
Continue Reading

CryptoLocker Clone Serves Up Energy Bill Spam Campaign

And here's another ransomware wannabe that has ripped off the CryptoLocker brand but is something totally different. A recent spam campaign sending out emails masquerading as an ...
Continue Reading

New Ransomware CryptoWall Comes With A Twist

Continue Reading

We’ll Pay Your Crypto-Ransom If You Get Hit With Ransomware

We’ll Pay Your Crypto-Ransom If You Get Hit
Continue Reading

New Ransomware Holds iPhones and iPads Hostage

Continue Reading

That ransomware payment is coming out of your allowance

Cartoon: Parenting is very different in 2014 compared to 1989! "That ransomware payment is coming out of your allowance."
Continue Reading

CyberheistNews Vol 4, # 20 CryptoLocker Goes Spear-Phishing

CyberheistNews Vol 4, # 20
Continue Reading

CryptoLocker Goes SpearPhishing

You may be familiar with a site called Spiceworks. They have free system admin and network management software, and their business model is advertising to the hundreds of thousands that ...
Continue Reading

Elite Hackers Develop Cybercrime Attack Kits As Market Matures

Today, in the Wall Street Journal, an article told the story of a software product called blackshades that experts call a "rat" (Remote Access Trojan) which was commercially sold to cyber ...
Continue Reading

WARNING Third Ransomware Strain Called CryptorBit Attacks

Welcome to the new world of malware.
Continue Reading

Wall Street Journal Quoted Me Regarding Ransomware Phishing Attacks

This week, Wall Street Journal MarketWatch reporter Priya Anand quoted me in an article she wrote about the new wave of ransomware phishing attacks.
Continue Reading

Backup Failures And Ransomware Phishing: Recipe For Disaster

With system administrators in the crossfire between cybergangs who are wielding sophisticated ransomware like CryptoLocker on one side and CryptoDefense on the other, it's likely many of ...
Continue Reading

The 7 Steps Of The Cyber Kill Chain

Cyber security professionals are slowly but surely grabbing more and more military jargon. No surprises there, with a possible cyberwar brewing. The "kill chain" is a traditional warfare ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews