As security controls and defense measures for computer systems become more sophisticated, cyber criminals have taken one step ahead in the world of Ransomware. The most profitable ransomware attacks has taken a leap with doxing.
What is Doxware ?
“Ransomware is the art of encrypting data on a network, users PC or Mac and asking for a ransom amount to decrypt it. With Doxware the criminals encrypt the data locally on the network and also copy the same to their own server and ask for ransom. If ransom is not paid then the sensitive information is posted publicly.”
The threat has increased two fold with Doxware with the risk of sensitive information going public if ransom is not paid.
Earlier if companies or individuals who regularly backed up their systems could easily wipe off and rebuild their machines if infected by ransomware. But now users who are a victim of the ransomware attacks are forced to pay the ransom to protect the reputation and sensitive information.
Malwarebytes was one of the first companies to report on this issue and they have identified at least 5 different variants of Doxware in the recent months since mid of last year. Doxware is not widespread as much as ransomware for now but this is predicted to increase during 2017 for targeted.
It’s very effective and a easy money for criminals by holding the victim hostage with their data. Currently only windows versions have been discovered as per Malwarebytes and it won’t be long before other operating systems are caught up. Universities, Government agencies, hospitals and many such sectors may end up paying instead of fighting against it as it’s a matter of sensitive data of going public verses money.
There is no fool proof prevention at this point but companies like Malwarebytes and Kaspersky have known definitions to stop some of the variants. Ultimately the end user must be cautious when clicking links while on the internet, have AV installed , have the latest patches for their Operating systems and possibly use a reputation based url checker integrated with their browsers.
Researchers from Checkpoint have identified that a dubbed malware Gooligan has infected more than 1.3 million Android users globally. Android targeted malware campaign infects devices and steals authentication tokens which is then used to access data from Google apps such as Google play, Gmail, google photos google docs, google drive and many others. The malware […] Continue reading →
Gatekeeper is the security feature of Mac OS X that protects users from malicious applications and code execution on their Mac computers. It warns Mac users from installing unsigned apps or the ones downloaded through an unencrypted connection. Gatekeeper does an efficient job of preventing the installation of Trojans and applications with malicious codes. However, […] Continue reading →
One of the most malicious attacks that can ever be launched on a website is being flooded with multiple requests that it cannot handle, otherwise known as DDoS’es. According to internet security researchers, this nightmare may have recently become a reality after one site was targeted in such a manner with an aim of overwhelming […] Continue reading →
Two new malwares that affect point of sale (PoS) machines have been detected by the researchers at Trend Micro. The malware have been affecting small and medium sized businesses or SMBs, primarily in the United States. These two malwares have been named Katrina and CenterPoS by their developers. Trend Micro researchers had earlier reported PoS […] Continue reading →
UT Austin ISO (Information Security Office) has detected a bug in Android 5.x that allows hackers to bypass the locked screen of the phone and access the home screen or other functions of the phone. For the purpose of the attack however the attacker must have physical access to the phone and the screen should […] Continue reading →
Mark Dowd, the head of Australia based Azimuth security has stated that there is a vulnerability in AirDrop, the file sharing service of Apple which allows unauthorized access to the device that can be used for the installation of malware. A user with an AirDrop configuration allowing file sharing with anyone and not merely their […] Continue reading →
A new kind of malware named SUCEFUL capable of stealing information from ATM cards and capable of retaining them in the ATM machines has been detected by FireEye Labs. The malware has been uploaded on VirusTotal and the researchers at FireEyes Labs traced it as Backdoor.ATM.Suceful. It seems that the name of the virus is […] Continue reading →
Stagefright Security patch leaves more than 950 million devices vulnerable hacked by a text The Stagefright vulnerability allows attacker to hack a phone with a text. Wiki (CVE-2015-3824) The patch issued by Google for Stagefright doesn’t fix the vulnerability leaving more than 95% of the Android devices vulnerable. The Android devices running version 2.2 to […] Continue reading →
IBM researchers have identified that more than 55% of Android users appeared to have impacted with Android serialization vulnerability – CVE-2015-3825. This basically means Android versions 4.3 and newer are vulnerable to this vulnerability. An advanced attackers could exploit this vulnerability to give a malicious app with no or least privileges the ability to become a super […] Continue reading →