An alert has been issued by the FBI and CISA (Cybersecurity and Infrastructure Security Agency) regarding Conti ransomware. "In typical Conti ransomware attacks, malicious cyber actors steal files, encrypt servers and workstations, and demand a ransom payment." Conti bad threat actors gain access to a network through spearphishing, smishing and vishing campaigns. They use malicious email attachments and links, fake phone calls, software promotions, stolen Remote Desktop Protocol (RDP) credentials, and other system vulnerabilities.
FamousSparrow, classified as an advanced persistent threat (APT) group, is a new hacking gang that targets government agencies, engineering companies, legal firms, and other organizations.
BlackMatter ransomware gang's attack on an Iowa grain and feed cooperative could lead to food shortages. The ransomware group is demanding $5.9 million from the agricultual cooperative which will go to $11.8 million if not paid within 5 days.
Microsoft has discovered what can be classified as a Phishing-as-a-Service (PHaaS) group, dubbed - BulletProofLink, BulletProftLink, and Anthrax. The group offers phishing email services including hosting and email management to cyber-gangs.
As ransomware attacks surge globally, Australians are choosing PC Matic's application whitelisting to proactively stop ransomware. PC Matic announced technical and sales support for its business product line, PC Matic Pro and PC Matic MSP, during Australian business hours. "Our mission is to protect the world from ransomware, and Australians understand that application whitelisting is a critical element in any security stack to proactively stop ransomware," said Rob Cheng, CEO and Founder of PC Matic.
CISA has released Trusted Internet Connections 3.0 Remote User Use Case guidance for goverment agencies. The Remote User Use Case provides federal agency users with guidance on how to apply network and multi-boundary security for agencies that allow remote users on their networks. Recent guidance also includes cybersecurity awareness with regards to ransomware attacks, network defense practices and best practices to prevent cyber-threats. Federal Agency Ransomware Protection.
Last week, the President signed the bipartisan K-12 Cybersecurity Act of 2021 into law to provide school districts with IT security resources to combat threats and protect themselves against cyberattacks including ransomware.
"Each year increased money and attention are devoted to cybersecurity, but ransomware continues to accelerate in the wrong direction. Despite national media coverage, ransomware attacks very rarely ever result in coverage that reveals the failed solutions that led to the infections. Why is that?"Learn More
"Lost in the entire conversation is cyber prevention. Why is that? By focusing strictly on reaction, rather than prevention, the cybersecurity industry maximizes revenue at the expense of their customers. Prevention is practical, economical, and normally not newsworthy. With reaction, however, there is money to be made for the cybersecurity experts who clean up after a ransomware attack, so for many in the industry an incentive exists to allow them to continue."Read Why Hackers are Winning
"As the developer of the first global whitelist, Rob Cheng is an American pioneer in cybersecurity. Our federal, state, and local governments would be in much better shape today, from a cyber defense perspective, if we had listened to him early on."
"Ransomware is now daily news and its victims are large technically sophisticated organizations, and critical elements of the cybersecurity industry. What is happening?"
Ransomware is getting past some of the most well-known antivirus software products and doing its dirty work for hackers and cybercriminals including some nation states. Which antivirus products or security products are failing to stop these cyber-attacks? A lack of transparency in the industry almost ensures that this vital information is not made public. Consequently, security holes and vulnerabilities are left unresolved resulting in more ransomware attacks. Other unsuspecting ransom victims are then hit, further fueling the security industry's expensive cycle of recovery efforts, and profits for the ransomware industry.
"The ransomware industry has blossomed into a high growth, high margin business extracting millions of dollars daily from its victims under the cloak of anonymity that have left law enforcement helpless. There is little barrier to entry to making ransomware. Rather than focusing on perpetrators, more attention should focus on the security holes through which the ransomware enters."
Finally, there is a ransomware solution - Read How to Stop Ransomware
"For every ransomware infection, there is a failed antivirus that allowed the ransomware on the network. Why is the public not informed which products are failing, and why they fail? Without ransomware prevention tools in place antivirus software alone is not enough to block threats."
Unlike blacklisting antivirus software products, Application Whitelisting solutions only allow known, good programs to run on your computer, mobile device, server or network. With whitelisting, any unknown or untested new programs can't run, preventing malicious ransomware from running. This effectively blocks hacker's attempts to encrypt your files or lock your system.
PC Matic is the leading producer of automated Application Whitelisting solutions and security software in the USA. Our security solutions protect enterprise and small business, industry, schools, hospitals, local and federal government IT systems and networks.Read more about Application Whitelisting Cybersecurity
Using Ransomware Decryption Tools vs Ransomware Prevention Tools. Many victims of a ransomware malware attack are searching for recovery and decryption tools when it would be much less stressful and less expensive to simply use a ransomware prevention tool like application whitelisting. Use of whitelist technology for access and application control is part of the NIST recommended cybersecurity protocols.
With whitelisting tools, IT administrators could prevent a server or network data breach to begin with and avoid the remediation and recovery process.
Modern whitelisting technology is cloud-based and very easy to maintain. Visit ransomware protection software for the best anti-ransomware on the market, and explore how application whitelisting solutions work to protect you, your data and your business.