Attacks on your Gmail can force you to pay ransom to keep data and secrets from cybercrooks

Attacks on your Gmail can force you to pay ransom to keep data and secrets from cybercrooks

[ad_1]

Ransomware does exactly what you might think it is. It carries some of your personal and sensitive data by encrypting it and preventing you from accessing this information. However, if the ransom that the attacker requests, the victim will receive the necessary encryption key to him to reach his data. The organization does not want to fall into a ransom scheme for fear of stealing its data, its operations, and its financial data has been affected negatively.

The FBI warns individuals and institutions against a ransom attack called "Midosa"

The FBI issued a warning about a ransom attack called "Midosa". As of last month, more than 300 people were victims by the ransom. These victims came from various industries, including medical, education, legal, insurance, technology and manufacturing sectors. Contrary to the attacks of personal harmful programs that aim to steal the personal account information of the individual and reliance data with the ultimate goal of cleaning the accounts and financial identities of the victim, Ransomware uses a different strategy.

The attack targets individuals and high -value companies who can pay a huge ransom in order to restore their data. The FBI has created a list of procedures that organizations should be interested in immediately to reduce the possible serious effect of "Medusa". These suggestions include:

  1. Reduces the known weaknesses by ensuring that operating systems, programs and fixed programs and update them within a period of time informed.
  2. Sector networks to restrict the side movement of the initials and other devices in the same organization.
  3. Filtering the network traffic by preventing unknown or unreliable assets from remote access to services on internal systems.
"Medusa" has evolved over the years, and it now runs what is a model for a double blackmail that encrypts the victims' data and seeks to earn large dollars by giving the victim the key to the encryption needed to access the stolen data only if the ransom is paid. At the same time, the attackers also threatened to issue stolen data and information that was passed publicly if the ransom is not paid. Most ransom notifications require that the victim acknowledge the receipt of the ransom note within 48 hours using Tor privatization.

Medusa runs a data leakage site. Onion with the timing of the countdown. The ransom requirements are published on the site, along with links to the coded currency governor that followed Midosa. Ads provide stolen data to the interested parties before the count of the countdown. Victims can add a day to the countdown timer by paying the addition of $ 10,000. The attackers are trying to make the victims feel that paying a ransom is just another picnic across a garden.

You can help yourself with long passwords for your applications and your accounts that you change frequently

According to the United States government, the MEDUSA developers employ the first access brokers (IBS) in electronic forums and markets. IIIBS specializes in accessing the institution's network and selling this access to actors threats, ransom groups or other bad actors. IBS usually usually uses hunting campaigns to steal passwords and other credentials used by victims. It also takes advantage of the defects of the programs listed in Cve.

Whether you are dealing with your applications and your own accounts, or those that belong to a company, use long passwords that you change frequently. Also consider using dual -factor authentication. The latter requires the user to log on online and through his phone when logging in to an application or website.

As you can see, this is a very superior attack, which is an attack that all companies, organizations and even individuals need to be aware of it. The FBI says it is cautious against clicking on the links on emails, texts, opening and downloading attachments. Email addresses can look real even if they are fake. These titles will be among the first places to find evidence that email or text is dangerous. The names of companies that have been dictated, poor numbering, and bad rules are signs that an e -mail or text is a potential bomb looking to detonate your organization or personal accounts.


[ad_2]
Download

Name is the most famous version in the series of publisher
Publisher
Genre News & Magazines
Version
Update March 18, 2025
Get it On Google Play
Rate this post
Download
Rate this post


Ransomware does exactly what you might think it is. It carries some of your personal and sensitive data by encrypting it and preventing you from accessing this information. However, if the ransom that the attacker requests, the victim will receive the necessary encryption key to him to reach his data. The organization does not want to fall into a ransom scheme for fear of stealing its data, its operations, and its financial data has been affected negatively.

The FBI warns individuals and institutions against a ransom attack called “Midosa”

The FBI issued a warning about a ransom attack called “Midosa”. As of last month, more than 300 people were victims by the ransom. These victims came from various industries, including medical, education, legal, insurance, technology and manufacturing sectors. Contrary to the attacks of personal harmful programs that aim to steal the personal account information of the individual and reliance data with the ultimate goal of cleaning the accounts and financial identities of the victim, Ransomware uses a different strategy.

The attack targets individuals and high -value companies who can pay a huge ransom in order to restore their data. The FBI has created a list of procedures that organizations should be interested in immediately to reduce the possible serious effect of “Medusa”. These suggestions include:

  1. Reduces the known weaknesses by ensuring that operating systems, programs and fixed programs and update them within a period of time informed.
  2. Sector networks to restrict the side movement of the initials and other devices in the same organization.
  3. Filtering the network traffic by preventing unknown or unreliable assets from remote access to services on internal systems.

“Medusa” has evolved over the years, and it now runs what is a model for a double blackmail that encrypts the victims’ data and seeks to earn large dollars by giving the victim the key to the encryption needed to access the stolen data only if the ransom is paid. At the same time, the attackers also threatened to issue stolen data and information that was passed publicly if the ransom is not paid. Most ransom notifications require that the victim acknowledge the receipt of the ransom note within 48 hours using Tor privatization.

Medusa runs a data leakage site. Onion with the timing of the countdown. The ransom requirements are published on the site, along with links to the coded currency governor that followed Midosa. Ads provide stolen data to the interested parties before the count of the countdown. Victims can add a day to the countdown timer by paying the addition of $ 10,000. The attackers are trying to make the victims feel that paying a ransom is just another picnic across a garden.

You can help yourself with long passwords for your applications and your accounts that you change frequently

According to the United States government, the MEDUSA developers employ the first access brokers (IBS) in electronic forums and markets. IIIBS specializes in accessing the institution’s network and selling this access to actors threats, ransom groups or other bad actors. IBS usually usually uses hunting campaigns to steal passwords and other credentials used by victims. It also takes advantage of the defects of the programs listed in Cve.

Whether you are dealing with your applications and your own accounts, or those that belong to a company, use long passwords that you change frequently. Also consider using dual -factor authentication. The latter requires the user to log on online and through his phone when logging in to an application or website.

As you can see, this is a very superior attack, which is an attack that all companies, organizations and even individuals need to be aware of it. The FBI says it is cautious against clicking on the links on emails, texts, opening and downloading attachments. Email addresses can look real even if they are fake. These titles will be among the first places to find evidence that email or text is dangerous. The names of companies that have been dictated, poor numbering, and bad rules are signs that an e -mail or text is a potential bomb looking to detonate your organization or personal accounts.



Download

 
Report

You are now ready to download for free. Here are some notes:

  • Please check our installation guide.
  • To check the CPU and GPU of Android device, please use CPU-Z app
Rate this post

Leave a Comment

Your email address will not be published. Required fields are marked *