article thumbnail

Why backups are not the panacea for recovery from a ransomware attack

SC Magazine

The most pervasive wisdom about preventing damage from ransomware is to backup systems, but that alone may not be enough. The most pervasive wisdom about preventing damage from ransomware is to backup systems. So in an era of increased concern about ransomware, is solving the ransomware scourge as simple as investing in some backups?

Backups 141
article thumbnail

Researchers Quietly Cracked Zeppelin Ransomware Keys

Krebs on Security

Peter is an IT manager for a technology manufacturer that got hit with a Russian ransomware strain called “ Zeppelin ” in May 2020. He’d been on the job less than six months, and because of the way his predecessor architected things, the company’s data backups also were encrypted by Zeppelin.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cring Ransomware spreading because of Fortinet vulnerability

CyberSecurity Insiders

European Enterprises mainly involved in manufacturing are being targeted by a new strain of Ransomware dubbed as Cring and confirmed sources say that the malware is being spread by exploitation of Fortinet VPN Vulnerability.

article thumbnail

Lacroix Group shut down three facilities after a ‘targeted cyberattack’

Security Affairs

French electronics manufacturer Lacroix Group shut down three plants after a cyber attack, experts believe it was the victim of a ransomware attack. The French electronics manufacturer Lacroix Group shut down three facilities in France, Germany, and Tunisia in response to a cyber attack. ” reported Yahoo Finance.

article thumbnail

Microsoft: Raspberry Robin worm already infected hundreds of networks

Security Affairs

The malware uses TOR exit nodes as a backup C2 infrastructure. The malware was first spotted in September 2021, the experts observed Raspberry Robin targeting organizations in the technology and manufacturing industries. Initial access is typically through infected removable drives, often USB devices.

article thumbnail

CISA and FBI issue alert about Zeppelin ransomware

Malwarebytes

While anyone can fall victim to these threat actors, the FBI noted that this malware has been used to target a wide range of businesses and critical infrastructure organizations, including defense contractors, educational institutions, manufacturers, technology companies, and especially organizations in the healthcare and medical industries.

article thumbnail

New device? Here's how to safely dispose of your old one

Malwarebytes

So, what we need to cover for peace of mind when we do get rid of our old devices are backups , so you don't lose your data when you get rid of your device, and scrubbing , so that usable data isn't left on the device. You can specify the files and settings that you want to back up and how often you want to perform a backup.

Backups 94