Another major crypto-ransomware campaign was spotted this week and has been found to have attacked over 20 million user inboxes.
The threat arrives like most ransomware infections: through an unsolicited email. The email appears to be from a legitimate source, with the attachments name and number included in the subject line and body of the email, for example: “Emailing: Payment_201708-6165.”
Barracuda Networks lead platform architect, Eugene Weiss, explains, “This attachment is a JavaScript file in a 7zip archive that the Barracuda ATP Dynamic Analysis Layer identified as a ‘file-encryption/ransomware’ type virus.”
The first step in this ransomware campaign is delivery, where the attachment arrives in the user's inbox, followed by infection, and inevitably, ransom. As always, NNT advises you to not pay the ransom as there’s not guarantee your files will be recovered.
This unsettling news is the latest in a series of large-scale ransomware threats that have dominated 2017 so far. From the devastating Locky ransomware to WannaCry, and NotPetya, there has been no shortage in ransomware attacks.
In fact, just last weekend NHS Lanarkshire was forced to shut down operations after it was hit by Bitpaymer ransomware. To add insult to injury, this is the second attack the organization has been hit with this year, the first being the infamous WannaCry attack that occurred back in May.
NNT has several Ransomware Mitigation Kits available to download, comprising the necessary automated vulnerability checks and Group Policy/Puppet templates to automatically fix any weaknesses identified in your environment.
Request your FREE NNT Ransomware Mitigation Kit
Read this article on InfoSecurity Magazine