Categories
How to

How to become ransomware proof’ish

If you want to know how you can become ransomware proof, then you are at the right place. In this article we will discuss how to become ransomware proof. Ransomware can do real damage to an environment, simply because it will lock out the user of accessing files which are stored on the device. The […]

Categories
Ransomware

Public Safety Affected by a Ransomware Attack

Another ransomware attack has found its target, this time it is the port of San Diego. “The Port of San Diego continues to investigate a serious cybersecurity incident that has disrupted the agency’s information technology systems, and the Port’s investigation so far has determined that ransomware was involved in this attack”┬ásaid┬áPort of San Diego CEO […]

Categories
Ransomware

GandCrab ransomware: My letter just for you

Beware of a new Gandcrab campaign that has been unleashed, this new campaign uses the mail title subject ‘My letter just for you’. The campaign tries to lure unaware users to download an .zip attachment, once the attachment has been downloaded and unpacked, an executable file will be made available. This executable is malicious, as […]

Categories
Cybersecurity

Woman confesses ransomware attack on Washington Police

A 28-year-old Romanian woman in the United States has stated to have been involved in an attack on police cameras in Washington DC. During the attack many surveillance cameras became useless because 126 connected network video recorders, used for storing camera images, were infected with ransomware. At the time that researchers intervened, the attackers were […]

Categories
Cybersecurity

The history of GandCrab and it’s future

Since January 2018 when the GandCrab ransomware first appeared, the GrandCrab ransomware has undergone a rapid development process. Information provided by McAfee’s Advanced Threat Research team suggests that GrandCrab is not developed professionally and often contains bugs. It exploits a number of attack vectors to gain a foothold on victim systems including remote desktop connections, […]