Are ransomware attacks making America great again?

  • Alabama School Districts
  • Oklahoma City public schools
  • Montebello Unified School District, California
  • Sugar-Salem School District, Idaho
  • Connecticut School Districts
  • Schools and government offices in Florida
  • Ohio schools
  • Louisiana School Districts
  • Schools in Syracuse and the Onondaga County Library, New York
  • Cryptomalware: This is a fairly common form of ransomware and can cause great damage. One of the best-known examples is the WannaCry variant, which in 2017 was used to attack thousands of targets worldwide; reaching the networks of some of the world’s largest corporations
  • Locker: This type of ransomware is known for infecting an operating system to completely block the victim from their computer, disabling access to any file or application
  • Scareware: This is fake software that acts like an antivirus or cleaning tool. Once installed, the scareware shows the victim a message that claims to have encountered a problem on their computer and demands a payment for its solution. Some types of scareware may even lock a computer, while others may spam supposed security messages on the user’s screen
  • Doxware: Also known as leakware, this ransomware variant threatens victims with posting online private information if the ransom is not paid. People store hundreds, even thousands of sensitive files on their devices (photos, login credentials, bank details, etc.), so they are highly likely to panic and give their money away to attackers if they find messages of this kind
  • Ransomware as a Service (RaaS): This is a service hosted online by malicious actors that anyone can hire to deploy ransomware campaigns against a particular target. When hired, hackers take care of everything they need to achieve the infection, from malware distribution and ransom transfers, to delivering the decryption keys
  • Don’t open any attachments or click on any links, and never forward or respond to a suspicious message
  • Check the authenticity of the email with your colleagues to see if someone else received the same message
  • If you do not have absolute certainty about the veracity or provenance of an email, you can contact the International Institute of Cyber Security (IICS) via e-mail info@iicybersecurity; by sending a screenshot of the suspicious email, highly trained staff in handling cybersecurity incidents will advise you what steps to take

--

--

--

Knowledge belongs to the world

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Why BAT’s Advertising Model is Not Sustainable

bharatpe scam on ashneer grover Biggest investor sequoia say will respond strongly to fraud or…

{UPDATE} Epic Battle Simulator 2 Hack Free Resources Generator

Decentralised Networks Are Paying Centralised Cloud Providers

AI — HackTheBox WriteUp

InfoSecSherpa’s News Round Up for Saturday, January 1, 2022

Image by Frohes neues Jahr from Pixabay

How to create a custom wallet address that has not been listed in trust wallet

FINDING API ENDPOINT USING WSDL | API HACKING SECRET 4

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Eli Cyber Security

Eli Cyber Security

Knowledge belongs to the world

More from Medium

7 vulnerabilities patched in Wireshark. Update immediately

InfoSecSherpa’s News Round Up for Wednesday, December 22, 2021

A serious Log4J flaw puts much of the internet at risk

Cowrie Honeypot Threat Analysis: Two Cryptocurrency Mining Approaches