Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

New Ransomware Trend – Threat Actors Plant Two Ransomware

admin by admin
Oct 2, 2023
in News
A A
0

The FBI alerts on rising ransomware trends and urges organizations to follow mitigation recommendations for minimizing ransomware risks and consequences.

In July 2023, the FBI observed two ransomware trends, and here we have mentioned them:-

  • Multiple attacks on the same victim in quick succession.
  • New data destruction tactics. 

Threat actors have attacked the targeted companies with two unique ransomware variants from the list of ransomware types below:-

Various combinations of variants were used that cause:- 

  • Data encryption
  • Data exfiltration
  • Financial losses

Repeated ransomware attacks on compromised systems pose significant harm to victims. The ransomware groups escalated the use of custom data theft and wiper tools to pressure victims in early 2022. 

In 2022, hackers upgraded data theft tools to evade detection, while dormant malware struck at scheduled intervals to corrupt the data.



Document

FREE Demo

Implementing AI-Powered Email security solutions “Trustifi” can secure your business from today’s most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware & Ransomware


Identity & Access Management

Here below, we have mentioned all the key things that are required for identity and access management:-

  • Mandate NIST password standards for all login accounts, including service, admin, and domain admin.
  • Enforce phishing-resistant 2FA for all services, especially webmail, VPNs, and critical system access.
  • Check for unfamiliar accounts in domain controllers, servers, workstations, and active directories.
  • Review admin accounts, and make sure to apply minimal access.
  • Always set time-based admin access.

FBI urges reporting suspicious/criminal activity to the local field office or ic3[.]gov. Include details like:-

  • Date
  • Time
  • Location
  • Activity type
  • Equipment
  • Company name
  • Contact

The U.S. Joint Ransomware Task Force (JRTF), led by CISA and FBI, combats rising ransomware threats sparked by major attacks on critical U.S. infrastructure.

Mitigations

Here below, we have mentioned all the mitigations:-

  • Maintain offline backups of data.
  • Ensure all backup data is encrypted and immutable.
  • Properly evaluate third-party vendor security links.
  • Enforce approved program execution policies for apps and remote access.
  • Track external remote connections, document approved solutions, and address unapproved installs.
  • Implement a recovery plan.
  • Segment networks.
  • Use network monitoring to spot and investigate ransomware signs.
  • Deploy, update, and activate real-time antivirus solutions on all hosts.
  • Secure and closely monitor RDP use.
  • Keep all operating systems, software, and firmware up to date.
  • Disable unused ports.
  • Consider adding an email banner to emails.
  • Disable hyperlinks.
  • Disable command-line and scripting activities and permissions.
  • Ensure devices are properly configured.
  • Make sure that all the security features are enabled.
  • Ensure disabling all the unused ports and protocols.
  • Limit SMB Protocol to essential servers, and disable old versions to prevent malware spread.

Protect yourself from vulnerabilities using Patch Manager Plus to quickly patch over 850 third-party applications. Take advantage of the free trial to ensure 100% security.

Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.