Ransomware MegaCortex aanvalt bedrijven in Europa en Noord-Amerika

Sophos specialisten een rapport gepubliceerd, gewijd aan de verhoogde activiteit van MegaCortex cryptograaf.

This extortionist is orientated majorly of corporate sector and used in the carefully planned targeted attacks.

Dergelijke incidenten zijn een echte trend in de nieuwste tijd, en veel grote bedrijven last van gerichte aanvallen: it is worth remembering LockerGoga “heroic actions”. Its victim was one of the world’s main aluminum producers Norsk Hydro, and a series of big chemical enterprises.

Other threats that similar approach are Ryuk, BitPaymer, Dharma, SamSam En Matrix.

Sophos analysist said that megacortex was discovered in January 2019, when someone uploaded malware’s specimen on VirusTotal. Since that time number of attacks constantly grows: in total experts noted 76 incidents, met 47 van hen (almost two thirds) occurred in the last week.

MegaCortex attacks affected companies in US, Canada, Netherlands, Ireland, Italy and France.

Cryptographers’ operators try as soon as possible to reach domain’s controllers and spread threat on as much systems as possible. “Recognize” MegaCortex is ealy due to extortionists’ message that can be seen below, or by changes files’ extensions as malware changes them on random sequence of eight symbols.

Megacortex ransom note black

In the report Sophos researchers acknowledge that could not detect how extortionist gets on infected hosts. Op zijn beurt, IT-experts write in social networks that MegaCortex allegedly uses for it Rietpoof uploader. This is quite interesting observation as usually cryptographers get in networks through the brutforce of the poorly protected RDP-endpoints or as an payload of the second phase of the attack, just after infection of machines with emote of trickbot malware.

Recommendations on MegaCortex from Sophos specialists:

As the attack seems to indicate that an administrative password was abused by the criminals, we also recommend the widespread adoption of two-factor authentication for everything that currently requires just a password, and can use 2FA.

Keeping regular backups of your most important and current data on an offline storage device is the best way to avoid having to pay a ransom altogether.

Bron: https://news.sophos.com

Over Trojan Killer

Carry Trojan Killer Portable op je memory stick. Zorg ervoor dat u in staat om uw pc te weerstaan ​​elke cyberdreigingen overal mee naar toe bent.

Controleer ook

MageCart op de Heroku Cloud Platform

Onderzoekers vonden verschillende MageCart Web Skimmers Op Heroku Cloud Platform

Onderzoekers van Malwarebytes rapporteerde over het vinden van een aantal MageCart web skimmers op de Heroku cloud-platform …

Android Spyware CallerSpy

CallerSpy spyware maskers als een Android-chat-applicatie

Trend Micro deskundigen ontdekte de malware CallerSpy, waarachter een Android chat-toepassing en, …

Laat een antwoord achter