How to safeguard your mobile devices from attack FBI has issued an advisory about

How to safeguard your mobile devices from attack FBI has issued an advisory about

[ad_1]

The FBI issued a warning about an unreasonable ransom attack on the typical fraud that may be familiar with it. The Ghost Ransomware campaign does not try to take you to "click here" via emails or deceptive texts. Instead, these attacks are carried out using a symbol available to the public in an attempt to exploit security gaps in fixed programs and programs that have not been hated for one reason or another. The attackers can access the servers facing the Internet and then attack by spreading ransom programs.

To clarify this, these attacks do not focus on mobile operating systems such as iOS or Android, but applications from the side attack as Adobe Coldfusion, Microsoft SharePoint and Microsoft Exchang Server. The attacks also follow the network devices that Fortinet Fortios operate. However, if you have your phone or tablet connected to a network at risk or you are visiting a harmful web hosted by an at risk server, the attackers can access your sensitive data and wipe your financial accounts.

The symbols of weaknesses and common exposure (CVE) do not directly associated with these attacks do not affect the operating systems that operate on mobile devices. However, they can create weaknesses indirectly affect mobile devices. But do not take this attack very lightly because it aims at multiple industries in more than 70 countries. The attackers are believed to manage this process outside China using names along with ghosts such as Cring, Crypt3r, Phantom, Strike, Hello, Wickrme, HSHARADA and Rapture.

CVE codes associated with these attacks include:

  • Cve-2009-3960
  • Cve 2010-2861
  • Cve 2018-13379
  • Cve 2019-0604
  • Cve-2021-31207
  • Cve-2021-34473
  • Cve-2021-34523

You can see through Cve numbers that some of these defects go back to 2009 and 2010. This means that old weaknesses have gone without being corrected for up to 16 years. Ransomware is used to lock important files on the user or server. Then the attacker demands ransom to cancel the files. Although it is not seen as in mobile devices, Ransomware still represents a threat to phones and tablets, and these attacks are often done on more Android mobile devices than iOS.

There are things you can do to help protect your phone or tablet. First in the list is to ensure that you always run the latest version of your device's operating system. We should not tell you that this is the best way to make sure that your device has the latest safety corrections available to it. In the same manner, make sure that all your applications are updated. By failing to update your applications, you can expose your mobile devices to weaknesses.

While using your device's mobile browser, stay away from suspicious websites and avoid clicking on the links. Also, although Ghost does not use hunting attacks, do not lower your guard when it comes to these email messages, texts and social correspondence functions. Be skeptical of any attempt to make you reveal passwords and account numbers. A virtual private network (VPN) may also be used to encrypt your data. Finally, you never connect your mobile phone or tablet to a general Wi-Fi connection.


[ad_2]
Download

Name is the most famous version in the series of publisher
Publisher
Genre News & Magazines
Version
Update February 23, 2025
Get it On Google Play
Rate this post
Download
Rate this post



The FBI issued a warning about an unreasonable ransom attack on the typical fraud that may be familiar with it. The Ghost Ransomware campaign does not try to take you to “click here” via emails or deceptive texts. Instead, these attacks are carried out using a symbol available to the public in an attempt to exploit security gaps in fixed programs and programs that have not been hated for one reason or another. The attackers can access the servers facing the Internet and then attack by spreading ransom programs.

To clarify this, these attacks do not focus on mobile operating systems such as iOS or Android, but applications from the side attack as Adobe Coldfusion, Microsoft SharePoint and Microsoft Exchang Server. The attacks also follow the network devices that Fortinet Fortios operate. However, if you have your phone or tablet connected to a network at risk or you are visiting a harmful web hosted by an at risk server, the attackers can access your sensitive data and wipe your financial accounts.

The symbols of weaknesses and common exposure (CVE) do not directly associated with these attacks do not affect the operating systems that operate on mobile devices. However, they can create weaknesses indirectly affect mobile devices. But do not take this attack very lightly because it aims at multiple industries in more than 70 countries. The attackers are believed to manage this process outside China using names along with ghosts such as Cring, Crypt3r, Phantom, Strike, Hello, Wickrme, HSHARADA and Rapture.

CVE codes associated with these attacks include:

  • Cve-2009-3960
  • Cve 2010-2861
  • Cve 2018-13379
  • Cve 2019-0604
  • Cve-2021-31207
  • Cve-2021-34473
  • Cve-2021-34523

You can see through Cve numbers that some of these defects go back to 2009 and 2010. This means that old weaknesses have gone without being corrected for up to 16 years. Ransomware is used to lock important files on the user or server. Then the attacker demands ransom to cancel the files. Although it is not seen as in mobile devices, Ransomware still represents a threat to phones and tablets, and these attacks are often done on more Android mobile devices than iOS.

There are things you can do to help protect your phone or tablet. First in the list is to ensure that you always run the latest version of your device’s operating system. We should not tell you that this is the best way to make sure that your device has the latest safety corrections available to it. In the same manner, make sure that all your applications are updated. By failing to update your applications, you can expose your mobile devices to weaknesses.

While using your device’s mobile browser, stay away from suspicious websites and avoid clicking on the links. Also, although Ghost does not use hunting attacks, do not lower your guard when it comes to these email messages, texts and social correspondence functions. Be skeptical of any attempt to make you reveal passwords and account numbers. A virtual private network (VPN) may also be used to encrypt your data. Finally, you never connect your mobile phone or tablet to a general Wi-Fi connection.



Download

 
Report

You are now ready to download for free. Here are some notes:

  • Please check our installation guide.
  • To check the CPU and GPU of Android device, please use CPU-Z app
Rate this post

Leave a Comment

Your email address will not be published. Required fields are marked *