Wormable Ransomware: Cybersecurity Week in Review—06/21/21
Posted by: GuidePoint Security
Ransomware was back in the news last week, with reports of wormable ransomware and newly discovered ransomware trojans. Vulnerabilities continue to be a problem with Linux and Tor Browser announcing fixes and patches. And cybercriminals continue to target businesses with phishing attacks.
Click on the links below to read posts that are of interest to you.
- Radiation Warnings: New DarkRadiation Ransomware Raising Alarms
- No Happy Days for US Schools Infected with ChaChi
- REvil Rivals Rip Off Ransomware
- TOR Project Announces Bug Fixes
- Linux Pling Problems
- Microsoft Tracking Phishing/Malware Campaign
- Criminals Using WIM Files in Phishing Campaign
- FINRA Warns of Targeted Phishing Attacks
A good business knows it has to pivot creatively to ensure success. And, while cybercriminals are villainous crooks and lawbreakers of the highest order, no one can argue that they aren’t creative or decent business operators. This week’s articles highlight criminal creativity quite well, whether it is pirating established and successful ransomware or using unique email attachments, such as WIM, to obfuscate malicious payloads.
When it comes to detection and protection, one of the biggest mistakes a business can make is to assume cybercriminals are without creativity, ingenuity, or business sense. To run a successful business, it is necessary to adapt to changing work models and create efficiencies that maximize overall product/service effectiveness and profits. This is why no one should ever underestimate cybercriminals. Often good money is riding on their success, making them highly driven to find creative ways to achieve their goals successfully.
Staying one step ahead of criminals takes time, patience and commitment. While we may never fully achieve complete protection from cybercrime, it helps to be as creative, ingenious and dedicated as the criminals themselves.
As always, it is important to remember that better security isn’t about one tool, technology, policy, or task force. It’s a team effort involving security professionals, businesses, and governments working together to better understand and combat cybercrime.
GuidePoint Security