• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
lockbit 2.0 ransomware disguised as pdfs distributed in email attacks

LockBit 2.0 ransomware disguised as PDFs distributed in email attacks

You are here: Home / General Cyber Security News / LockBit 2.0 ransomware disguised as PDFs distributed in email attacks
June 27, 2022

Scientists in Korea have discovered threat actors focusing on companies with e-mails claiming copyright infringement that contain ransomware.

AhnLab Security Emergency Response Heart (ASEC) has collected evidence of emails sent to providers with a password-guarded compressed file connected, in which lies Lockbit.20 ransomware disguised with a PDF file icon.

Whilst the research pointed to an active campaign by menace actors inside of the Republic of Korea, the common nature of Lockbit 2. usually means there is authentic prospective that the exact strategies could before long be made use of to target companies in Europe and the US.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


In current attacks, email messages have been noticed carrying a file that seems to contain the visuals of certified articles in dispute. These kinds of email messages might comprise the title of true artists, to insert to their legitimacy, and comply with a related fraud in which these kinds of documents had been handed off as resumes.

If the consumer opens the attached file, which has a PDF file icon disguised as a Lockbit executable, it will execute a series of processes to avert file recovery and sign up alone to the technique registry to continue to keep by itself managing constantly. The consumer will immediately locate their open procedures terminating, and documents shifting to come to be unopenable and bear a crimson letter ‘B’ icon.

Lockbit 2. will work to encrypt all information, community or externally linked, that does not pertain to core procedure capabilities. Documents are also uploaded to a server managed by the attackers, who then a ransom take note in the variety of a textual content file urging the sufferer to shell out them cash. Of course, there is no way to ensure that any deal produced with the attackers would be honoured, so this is in no way an encouraged route for recovering one’s data.

Of all ransomware, Lockbit 2. poses one particular of the finest particular threats to firms suitable now, with cyber security advisor NCC Team advising in a modern website post that throughout May perhaps, Lockbit 2. accounted for 40% of ransomware attacks. The Federal Bureau of Investigation (FBI) also produced a report before this 12 months detailing the unique hazards posed by the risk actor and observed the only targets it does not infect are people employing Eastern European languages for their devices.

Smaller enterprises are most likely to be influenced by this process of attack, as they typically deficiency devoted authorized teams who would be able to recognize the legitimacy of the e-mail. Additionally, staff in more compact firms are considerably less likely to have been given anti-phishing training.

“Lockbit 2. has quick cemented its place as the most prolific threat actor of 2022,” said NCC’s world-wide direct for strategic threat intelligence, Matt Hull.

“It is very important that businesses familiarise them selves with their tactics, methods, and treatments. It will give them a greater comprehension of how to shield from attack and the most acceptable security steps to employ.”


Some areas of this post are sourced from:
www.itpro.co.uk

Previous Post: «Cyber Security News Snoopers’ Charter Ruled Partially Unlawful
Next Post: Google warns of ‌ISP-controlled Hermit spyware google warns of ‌isp controlled hermit spyware»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Cybercriminals Using New ASMCrypt Malware Loader Flying Under the Radar
  • Lazarus Group Impersonates Recruiter from Meta to Target Spanish Aerospace Firm
  • Post-Quantum Cryptography: Finally Real in Consumer Apps?
  • Microsoft’s AI-Powered Bing Chat Ads May Lead Users to Malware-Distributing Sites
  • Progress Software Releases Urgent Hotfixes for Multiple Security Flaws in WS_FTP Server
  • Cisco Warns of Vulnerability in IOS and IOS XE Software After Exploitation Attempts
  • GitHub Repositories Hit by Password-Stealing Commits Disguised as Dependabot Contributions
  • China’s BlackTech Hacking Group Exploited Routers to Target U.S. and Japanese Companies
  • The Dark Side of Browser Isolation – and the Next Generation Browser Security Technologies
  • China-Linked Budworm Targeting Middle Eastern Telco and Asian Government Agencies

Copyright © TheCyberSecurity.News, All Rights Reserved.