article thumbnail

ALPHV/BlackCat ransomware affiliate targets Veritas Backup solution bugs

Security Affairs

An ALPHV/BlackCat ransomware affiliate was spotted exploiting vulnerabilities in the Veritas Backup solution. An affiliate of the ALPHV/BlackCat ransomware gang, tracked as UNC4466, was observed exploiting three vulnerabilities in the Veritas Backup solution to gain initial access to the target network. CVSS score: 8.1).

Backups 97
article thumbnail

Preparing for Ransomware: Are Backups Enough?

eSecurity Planet

In a year where ransomware has raised the alert levels everywhere, the go-to answer from many is redundancy through offline, remote backups – but are they enough? Backups are a critical component of any enterprise cybersecurity posture, but they are not an airtight strategy. Why Are Backups Critical?

Backups 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Onyx Ransomware Destroys Large Files Instead of Locking Them

eSecurity Planet

Ransomware just keeps getting worse, it seems. Cybersecurity researchers last week revealed that a new ransomware gang called Onyx is simply destroying larger files rather than encrypting them. The Onyx ransomware group doesn’t bother with encryption. Also read: Best Backup Solutions for Ransomware Protection.

article thumbnail

A history of ransomware: How did it get this far?

Malwarebytes

Today's ransomware is the scourge of many organizations. If we define ransomware as malware that encrypts files to extort the owner of the system, then the first malware that could be classified as ransomware is the 1989 AIDS Trojan. But where did it start?

article thumbnail

Six Steps to Protect Your Organization from Ransomware | #RansomwareWeek

CyberSecurity Insiders

Yesterday, we announced that (ISC)² has granted free access to its "Ransomware: Identify, Protect, Detect, Recover" course through the Professional Development Institute to anyone who is interested in learning more about prevention and remediation. In March, CNA Financial reportedly paid ransomware attackers $40 million.

article thumbnail

Using the LockBit builder to generate targeted ransomware

SecureList

They generated a custom version of the ransomware, which used the aforementioned account credential to spread across the network and perform malicious activities, such as killing Windows Defender and erasing Windows Event Logs in order to encrypt the data and cover its tracks. Revisiting the LockBit 3.0 builder files The LockBit 3.0

article thumbnail

CISA updates ransomware guidance

Malwarebytes

The Cybersecurity and Infrastructure Security Agency (CISA) has updated its #StopRansomware guide to account for the fact that ransomware actors have accelerated their tactics and techniques since the original guide was released in September of 2020. Misuse of these tools is a common ransomware technique to inhibit system recovery.