Ransomware MegaCortex angriber virksomheder i Europa og Nordamerika

Sophos specialister offentliggjorde en rapport, dedikeret til øget aktivitet af MegaCortex kryptograf.

This extortionist is orientated majorly of corporate sector and used in the carefully planned targeted attacks.

Sådanne hændelser er en reel tendens i den seneste tid, og mange store virksomheder led af målrettede angreb: it is worth remembering LockerGoga “heroic actions”. Its victim was one of the world’s main aluminum producers Norsk Hydro, and a series of big chemical enterprises.

Other threats that similar approach are Ryuk, BitPaymer, Dharma, SamSam og Matrix.

Sophos analysist said that megacortex was discovered in January 2019, when someone uploaded malware’s specimen on VirusTotal. Since that time number of attacks constantly grows: in total experts noted 76 incidents, med 47 af dem (almost two thirds) occurred in the last week.

MegaCortex attacks affected companies in US, Canada, Netherlands, Ireland, Italy and France.

Cryptographers’ operators try as soon as possible to reach domain’s controllers and spread threat on as much systems as possible. “Recognize” MegaCortex is ealy due to extortionists’ message that can be seen below, or by changes files’ extensions as malware changes them on random sequence of eight symbols.

Megacortex ransom note black

In the report Sophos researchers acknowledge that could not detect how extortionist gets on infected hosts. I sin side, IT-experts write in social networks that MegaCortex allegedly uses for it Rietpoof uploader. This is quite interesting observation as usually cryptographers get in networks through the brutforce of the poorly protected RDP-endpoints or as an payload of the second phase of the attack, just after infection of machines with intimidere eller Trickbot Malware.

Recommendations on MegaCortex from Sophos specialists:

As the attack seems to indicate that an administrative password was abused by the criminals, we also recommend the widespread adoption of two-factor authentication for everything that currently requires just a password, and can use 2FA.

Keeping regular backups of your most important and current data on an offline storage device is the best way to avoid having to pay a ransom altogether.

Kilde: https://news.sophos.com

Om Trojan Killer

Carry Trojan Killer Portable på din memory stick. Vær sikker på, at du er i stand til at hjælpe din pc modstå eventuelle cyber trusler, hvor du går.

Tjek også

MageCart på Heroku Cloud Platform

Forskere har fundet flere MageCart Web Forplove On Heroku Cloud Platform

Forskere ved Malwarebytes rapporteret om at finde flere MageCart web skummere på Heroku cloud-platform …

Android Spyware CallerSpy

CallerSpy spyware masker som en Android chat applikation

Trend Micro eksperter opdagede malware CallerSpy, hvilke masker som en Android chat program og, …

Efterlad et Svar