Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label Big Head. Show all posts

Critical Ransomware Threat: Disguised as Windows Update, Beware!

 


Ransomware is a form of malware that allows hackers to encrypt non-transferable files on a computer so that they cannot be released. Cyberattackers encrypt the files that they want to access and then demand a ransom payment for the decryption key so that organizations end up in a situation where paying the ransom is the easiest and cheapest way to regain access to the files that they want to access. 

Ransomware variants have also been developed that add additional functionality to increase the incentive for victims to pay the ransom - such as data theft - to provide them with even more incentive. 

Ransomware cases have grown rapidly and have become one of the most visible types of malware. In the recent past, hospitals have faced an array of problems that have compromised their ability to provide crucial services, public infrastructure in cities has been crippled, and a wide variety of organizations have suffered significant losses. 

Among the latest money extortion scams reported, Fortinet has identified a fake Windows update page masquerading as a money extortion scam. In its advisory, Microsoft urges users of the most popular desktop operating systems to exercise caution. 

A massive cryptographic attack that the security company's FortiGuard Labs division says is of high severity has been detected on a compromised computer where files have been encrypted. Ransom is the amount demanded by the attacker in exchange for file return. 

Ransomware variants known as Big Head and Blackout were both launched in May 2023, according to researchers. There are about three current variants of this virus that encrypt files on victims' computers to extract money from them. 

Computers can be infected with thousands of viruses, software programs, and a wide range of other security threats. There are some threats out there that can potentially allow access to private information by third parties, or slow down the performance of your computer. 

If your computer displays the symptoms of a virus or malware infection, follow these steps to check whether the computer may have been infected. In this case, it is done once the computer has been returned from service, or after the system has been recovered. 

A computer is changed back to its original configuration when it is being serviced or when it is being recovered automatically after a system recovery has taken place. It means that it is set up in the same manner as when it was bought, which means that it has not changed. As a result, all software and driver updates installed on the computer from when it started to the present have been lost. 

There is no security update installed on the computer since it is in such a like-new condition, which leaves it more susceptible to viruses due to the removal of security updates. 

An Attack on Windows Updates Has Been Detected 


"There is no indication that Big Head has spread throughout the network," FortiGuard Labs stated in a statement. Because it is only a few weeks old, it is difficult to predict how quickly it could spread since it has only been around for just a few weeks. 

The analyst has so far been able to observe two variants of the virus that are currently active. As soon as the fake Windows Update screen appears on the screen, it will display the phrase "Configuring critical Windows Updates." After around 30 seconds, it will disappear from the screen, leaving users' files encrypt with names that are randomly manipulated. 

In several "README" files that have been viewed by the public, email addresses, Telegram account information, and even Bitcoin addresses have all been found. File decryption is a request made with the promise of collecting money from victims to gain their trust. 

This second version of ransomware uses a different method to affect users. This method requires the attacker to change the desktop wallpaper to display a ransom note that demands one Bitcoin at present ($30,000). 

There are reports that the Big Head malware appears to be targeting US consumers currently, although similar attacks have been observed in other countries, such as Spain, France, and Turkey, by the same group. 

A recently released report from FortiGuard concludes that one of the most effective ways to prevent ransomware attacks is to learn some simple cybersecurity knowledge and proper cybersecurity hygiene. 

With ransomware attacks becoming more frequent and more sophisticated every day, it is important to take into account the frequency, location, and security of your data backups. 

How can Ransomware be Removed? 


Ransom messages are not something most people want to receive on a computer since they reveal that the machine has been infected with ransomware and that it has successfully put up a ransom. An active ransomware infection can now be responded to in some way to minimize the damage. Paying or not paying a ransom is a very important decision that must be made by an organization. 

A Guide to Mitigating an Active Infection of Ransomware 


Ransomware is a computer virus that is capable of encrypting data, displaying a ransom note on its screen after it is encrypted and the virus has been discovered. As it stands, the encrypted files are probably irrecoverable at this point, but some steps can be taken right away to help prevent this from happening. 

There should be an immediate quarantine of the machine. Some varieties of ransomware will spread to nearby drives and other computers. By removing access to other potential targets, malware can be contained by limiting infection spread. 

Keeping the computer on is crucial, encrypting files can cause a computer to become unstable, as well as powering off a computer may lead to loss of volatile memory on the computer. To maximize the chances of recovering from a crash, it is recommended that the computer remain on.

In some ransomware variants, it is possible to decrypt encrypted files without paying a ransom. In the case that a solution becomes available or if a successful decryption attempt is not successful, it is imperative to have a copy of encrypted files on removable media. 

A backup copy of a file stored on a computer can sometimes be found in the backup section of the computer. The copies can usually be recovered by a digital forensics expert if they have not been deleted by the malware during its execution.