{"id":57608,"date":"2017-08-07T12:07:32","date_gmt":"2017-08-07T17:07:32","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=57608"},"modified":"2017-08-07T12:07:32","modified_gmt":"2017-08-07T17:07:32","slug":"cerber-expands-corruption-power","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/cerber-expands-corruption-power\/","title":{"rendered":"Cerber Ransomware Expands It&#8217;s Corruption Power"},"content":{"rendered":"<h3>Cerber is now draining bitcoin wallets, on top of encrypting files<\/h3>\n<p>Cerber, a ransomware variant that has been notorious for making alterations to its malware to worsen the impact, has done it again. \u00a0Now the ransomware variant is targeting bitcoin wallets. \u00a0Once infected with Cerber, the malware will search the user&#8217;s device for different files tied to bitcoin wallets. \u00a0Once it finds them, it will not only steal the bitcoins, but also encrypt various data on the user&#8217;s device. \u00a0Then, to get their data back, the cyber criminals request another bitcoin payment.<\/p>\n<p>And it gets worse. \u00a0The newest version of Cerber also has the capability to steal the user&#8217;s browser passwords. \u00a0According to <a href=\"https:\/\/themerkle.com\/cerber-ransomware-now-aims-to-steal-bitcoin-wallet-information\/\">The Merkle<\/a>, this includes passwords stored on Chrome, FireFox, and Internet Explorer. \u00a0To some users, this may not be an issue &#8212; as they chose not to save passwords within their browser. \u00a0But, let&#8217;s be honest &#8212; most people do, regardless of how many times they are told not to.<\/p>\n<h3>Staying Protected<\/h3>\n<p>There are a few things users can do to stay protected against this threat.<\/p>\n<ol>\n<li>To avoid the attack completely,<a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=504631\"> invest in a security solution that uses application whitelisting technology<\/a>. \u00a0This will prevent any new and unknown threats from infecting the PC. \u00a0It does so by blocking all unknown programs\/files. \u00a0Once an unknown file is blocked, it is sent for testing to be deemed safe or malicious.<\/li>\n<li>Move all bitcoin wallets to hardware wallets. \u00a0At this time, they have yet to be targeted by hackers.<\/li>\n<li>Stop saving your passwords within your browser.<\/li>\n<li>Be aware, all the time. \u00a0This means, thinking about every website you go to, every ad you click on, and every email you open. \u00a0Cyber criminal prey on device users, and often times we click without thinking. \u00a0This needs to stop, if data is going to stay protected.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Cerber is now draining bitcoin wallets, on top of encrypting files Cerber, a ransomware variant that has been notorious for making alterations to its malware to worsen the impact, has done it again. \u00a0Now the ransomware variant is targeting bitcoin wallets. \u00a0Once infected with Cerber, the malware will search the user&#8217;s device for different files [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55140,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4949,5000,5090],"tags":[5016,4363],"class_list":["post-57608","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","category-ransomwarewar","category-slider","tag-cerber","tag-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cerber Ransomware Expands It&#039;s Corruption Power<\/title>\n<meta name=\"description\" content=\"Cerber, the ransomware notorious for consistently morphing to increase it&#039;s malicious power, has done it yet again - targeting...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/cerber-expands-corruption-power\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cerber Ransomware Expands It&#039;s Corruption Power\" \/>\n<meta property=\"og:description\" content=\"Cerber, the ransomware notorious for consistently morphing to increase it&#039;s malicious power, has done it yet again - targeting...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/cerber-expands-corruption-power\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-07T17:07:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareScreen.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cerber-expands-corruption-power\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cerber-expands-corruption-power\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Cerber Ransomware Expands It&#8217;s Corruption Power\",\"datePublished\":\"2017-08-07T17:07:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cerber-expands-corruption-power\\\/\"},\"wordCount\":316,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cerber-expands-corruption-power\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomwareScreen.jpg\",\"keywords\":[\"cerber\",\"ransomware\"],\"articleSection\":[\"Ransomware\",\"RansomwareWar\",\"TechTalk Slider\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cerber-expands-corruption-power\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cerber-expands-corruption-power\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cerber-expands-corruption-power\\\/\",\"name\":\"Cerber Ransomware Expands It's Corruption Power\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cerber-expands-corruption-power\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cerber-expands-corruption-power\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomwareScreen.jpg\",\"datePublished\":\"2017-08-07T17:07:32+00:00\",\"description\":\"Cerber, the ransomware notorious for consistently morphing to increase it's malicious power, has done it yet again - targeting...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cerber-expands-corruption-power\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cerber-expands-corruption-power\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cerber-expands-corruption-power\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomwareScreen.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomwareScreen.jpg\",\"width\":1920,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cerber-expands-corruption-power\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cerber Ransomware Expands It&#8217;s Corruption Power\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cerber Ransomware Expands It's Corruption Power","description":"Cerber, the ransomware notorious for consistently morphing to increase it's malicious power, has done it yet again - targeting...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/cerber-expands-corruption-power\/","og_locale":"en_US","og_type":"article","og_title":"Cerber Ransomware Expands It's Corruption Power","og_description":"Cerber, the ransomware notorious for consistently morphing to increase it's malicious power, has done it yet again - targeting...","og_url":"https:\/\/www.pcmatic.com\/blog\/cerber-expands-corruption-power\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2017-08-07T17:07:32+00:00","og_image":[{"width":1920,"height":550,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareScreen.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/cerber-expands-corruption-power\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/cerber-expands-corruption-power\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Cerber Ransomware Expands It&#8217;s Corruption Power","datePublished":"2017-08-07T17:07:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/cerber-expands-corruption-power\/"},"wordCount":316,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/cerber-expands-corruption-power\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareScreen.jpg","keywords":["cerber","ransomware"],"articleSection":["Ransomware","RansomwareWar","TechTalk Slider"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/cerber-expands-corruption-power\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/cerber-expands-corruption-power\/","url":"https:\/\/www.pcmatic.com\/blog\/cerber-expands-corruption-power\/","name":"Cerber Ransomware Expands It's Corruption Power","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/cerber-expands-corruption-power\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/cerber-expands-corruption-power\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareScreen.jpg","datePublished":"2017-08-07T17:07:32+00:00","description":"Cerber, the ransomware notorious for consistently morphing to increase it's malicious power, has done it yet again - targeting...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/cerber-expands-corruption-power\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/cerber-expands-corruption-power\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/cerber-expands-corruption-power\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareScreen.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareScreen.jpg","width":1920,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/cerber-expands-corruption-power\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cerber Ransomware Expands It&#8217;s Corruption Power"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/57608","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=57608"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/57608\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55140"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=57608"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=57608"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=57608"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}