The series of e-mails was sent on Wednesday around noon not only to those with Netflix accounts. The message calls for the billing information to be updated, as it is easy to guess about the credit card. The website to which we are directed resembles the original Netflix website, in addition, it is secured with the SSL protocol (https - website address with a padlock).
webdev
The NetWalker - A new player in the ransomware market. Over USD 25 million was extortet as the result of infections in the five months only! Poland is also on target.
Well, the real ransomware tornado is probably still ahead of us. Meanwhile, stronger and stronger gusts can be observed - this time it is NetWalker. McAfee mentions in its extensive report that NetWalker's ransom revenue reached over $ 25,000,000 (for the period March 1, 2020 through the end of July). What is the target of the criminals? Larger companies that have valuable data (and most importantly, a ransom budget).
Ransomware: The internet's biggest headache refuses to go away
Ransomware: The internet’s biggest headache refuses to go away
Ransomware attacks have been with us for decades: Here’s why are will continue to create chaos for years to come. Ransomware has been around for more than three decades, so it’s hardly an unexpected threat.
Polish Ministry of Digitization warns: Ransomware - how to protect yourself and not pay the ransom?
Ransomware, as these attacks are called, is a type of computer virus that encrypts files on the victim computer and in practice blocks its operation. Criminals are demanding a ransom for issuing the key to decrypt the data. Hence - derived from the word ransom (ransom) - name.Ransomware – jak si? uchroni? i nie p?aci? okupu?
A rare opportunity to see what the negotiations with blackmailers look like step by step
Polite and very professional customer service. Quick response and full understanding of the situation, professional service, and finally solid recommendations. Is it a Customer Service Laurel? No, they are the criminals behind ransomware. As a rule, negotiations regarding payment for data recovery are not supposed to see the light of day - but sometimes it is possible to obtain a record of their progress.
CERT warns of a new threat. You have to watch out for emails with attachments
Emotet is a dangerous piece of software that has been coming back for several years. This time is no different, and hackers reuse this code to infect victims' devices. To do this, they send fake e-mail messages that contain documents with dangerous macros or links. You must arm yourself with vigilance.
Spanish rail infrastructure hit by ransomware. As part of the "demo", the attackers made some of the files public
?Dop?ata bitcoinowa w hiszpa?skich poci?gach” brzmia?aby w tytule zbyt clickbaitowo ? Ale kto wie czy realnie do nie sprowadzi si? obecna akcja. Hiszpa?ski ADIF zatrudnia oko?o 13 000 pracowników i zarz?dza infrastruktur? kolejow? (tory, sygnalizacja, stacje) i uspokaja ?e wszystko pod kontrol?. Inaczej twierdz? operatorzy REvil: „hackers have claimed to have taken 800GB of data including correspondence and contracts. ?Simultaneously with the publication, the third attack will follow,? the message reads. ?We will continue to download your data until you contact us.?
Garmin is out osf service. Garmin connect and mobile applications are dead, the mail server is down as well as the call center. The suspected culprit: ransomware.
Garmin is quite enigmatic about the problem that is officially reported by the company. If we dig a little deeper, we will find out that probably at least some production lines in Asia are also not working, and ransomware is suspected of all the fuss. For several hours, problems have been reported by people all over the world, including Poland.
New 'Shadow Attack' can replace content in digitally signed PDF files
New 'Shadow Attack’ can replace content in digitally signed PDF files | ZDNet
Fifteen out of 28 desktop PDF viewer applications are vulnerable to a new attack that lets malicious threat actors modify the content of digitally signed PDF documents. The list of vulnerable applications includes Adobe Acrobat Pro, Adobe Acrobat Reader, Perfect PDF, Foxit Reader, PDFelement, and others, according to new research [ PDF] published this week by academics from the Ruhr-University Bochum in Germany.
How can I always be one step ahead of scammers if they know the best shortcuts?
When honesty loses allies for quick profits, deception becomes a way of life for many. Companies, ordinary people and our relatives may fall victim to unfair practices. With a view to counteracting abuses, also the intensification of the phenomenon in the current situation, we are launching the #KrokPrzedOszustem initiative, which helps to prevent them. This portal is designed to provide knowledge about possible crime patterns and jointly create a reliable and up-to-date knowledge base.