TN Police issues Cyber Crime Alert: Lorenz Ransomware!
Send us your feedback to audioarticles@vaarta.com
Ransomware is a form of malware that encrypts a victim's files. The attacker then demands a ransom from the victim to restore access to the data upon payment. Doing this in a slightly modified way is the up and coming Lorenz gang! It is a new ransomware operation known as Lorenz targets organizations worldwide with customized attacks demanding hundreds of thousands of dollars in ransoms.
The Lorenz ransomware gang began operating last month and has since amassed a growing list of victims whose stolen data has been published on a ransomware data leak site. However, it is to be noted that the ransomware could affect any system including your personal system. The most common ransomware infection routes include visiting malicious websites, downloading a malicious attachment or via unwanted add - ons during downloads.
These various Cyber criminals use tactics like, delivering a customized malware using phishing emails, spam and other techniques to the victim and once the victim is infected, the malware will capture the admin credentials from the system and spread the infection to other devices connected to the network. Then, It encrypts all data and asks for ransom for data access. The malware gang also sets up a dedicated Tor payment site for every victim.
Is there a way out of this? Nope! But you certainly can take precautions like, downloading contents only from trusted sources, removing unknown accounts from your network, you should also make sure that all operating systems and applications should be kept updated on a regular basis. This measure hinders cybercriminals from gaining easy access to any system through vulnerabilities in outdated applications and softwares. Also, avoid applying updates/patches available in any unofficial channel. Ransomware infections primarily keep data as hostage. Therefore, practicing regular backup of critical data (personal/business) in the event of such outbreaks is the only way to recover the encrypted files.
Follow us on Google News and stay updated with the latest!
Comments
- logoutLogout