Category: Ransomware

  • How Do Websites Use My Data?

    How Do Websites Use My Data?

    Understanding User Data: How Websites Collect, Share, and Protect Information

    Websites collect and use user data in various ways, primarily to personalize content, display targeted ads, and improve user experience. This information can range from basic details—such as browser type and IP address—to sensitive data like names and credit card numbers.

    Being informed about how websites gather, utilize, and share data is crucial for maintaining digital privacy. In this article, we’ll explore how data collection works, best practices for sharing information responsibly, and why safeguarding personal data matters.

    What Is Data Collection on Websites?

    Data collection is a standard practice that allows websites to gather insights about their visitors. This occurs through multiple methods, including:

    • Cookies – Small files stored on a user’s device that track browsing activity.
    • User Interactions – Websites analyze clicks, scroll patterns, and form submissions to improve content relevance.

    Websites typically collect two types of information:

    1. First-party data – Directly obtained from the site itself (e.g., past purchases, browsing history).
    2. Third-party data – Sourced from external platforms, such as advertisers, which may include demographic insights and behavioral patterns.

    Some websites integrate tracking codes from platforms like Google and Facebook, allowing them to monitor internet activity and refine ad targeting strategies.

    While data collection enhances user experience, it also raises privacy concerns. Users should be aware of how their information is stored and shared, as transparency fosters trust between websites and their visitors.

    How Does Data Sharing Work?

    Data sharing refers to the practice of making collected data accessible to multiple parties. Businesses and institutions often share data through:

    • APIs (Application Programming Interfaces) – Facilitate real-time data exchanges between systems.
    • Cloud Services – Provide centralized storage solutions for seamless access.
    • File Transfer Protocol (FTP) – Secure methods for data transfers.

    Challenges in Data Sharing

    While data sharing offers valuable insights, it also poses privacy risks if not properly managed. Some key concerns include:

    • Data security vulnerabilities – Encryption and access controls are crucial to prevent unauthorized exposure.
    • Regulatory compliance – Laws like GDPR (General Data Protection Regulation) and CCPA (California Consumer Privacy Act) require transparency and user consent.
    • Ethical considerations – Data must be used responsibly, ensuring that individuals retain control over their information.

    Responsible data sharing demands strict governance policies and comprehensive records to safeguard user privacy.

    How Should Websites Manage User Data?

    Effective data management is essential for maintaining user trust and ensuring regulatory compliance. Websites should collect only necessary information and implement secure storage solutions.

    Best Practices for Data Management

    1. Transparency and Consent – Websites must clearly disclose data collection methods and allow users to opt in or opt out.
    2. Data Minimization – Gathering only essential data reduces risks and simplifies compliance.
    3. Secure Storage Solutions – Encryption of data both at rest and in transit prevents unauthorized access.
    4. User Control – Providing tools for users to edit, download, or delete their data fosters accountability.

    These measures ensure responsible data handling while protecting user privacy.

    Why Is Data Privacy Important?

    Data privacy is a fundamental right that allows individuals to control their personal information. Organizations must implement strategies to protect user data, including:

    • Employee training – Ensuring awareness of privacy laws and security practices.
    • Encryption – Safeguarding stored information from cyber threats.
    • Transparent policies – Clearly outlining how data is used, stored, and shared.

    Ensuring Compliance with Privacy Regulations

    Legal frameworks such as GDPR and CCPA impose penalties for non-compliance, making it crucial for organizations to:

    • Regularly update privacy policies
    • Conduct security audits
    • Maintain accurate records of data processing activities

    Building Trust Through Transparency

    Open communication about how personal data is used fosters trust and encourages responsible data practices. Users should have easy access to consent settings, allowing them to adjust privacy preferences.

    In the final section, we’ll explore proactive steps that individuals can take to protect their data online.

    How Can Users Protect Their Data?

    Individuals can enhance their digital privacy by using tools designed to block data tracking and prevent unauthorized access.

    Essential Data Protection Strategies

    • Privacy-Focused Browsers – Tools like Brave or Firefox limit data tracking.
    • Regular Security Audits – Reviewing privacy settings on social media platforms reduces exposure risks.
    • Cautious Online Behavior – Avoid sharing unnecessary personal information on public forums.

    Recommended Privacy Tools

    • VPNs (Virtual Private Networks) – Mask IP addresses and encrypt internet traffic.
    • Password Managers – Secure login credentials and prevent weak passwords.
    • Software Updates – Keeping apps and browsers up to date eliminates security vulnerabilities.

    Educating yourself on data privacy and security best practices empowers you to make smarter choices online.

    Take Action to Protect Your Data

    Understanding how websites collect and share user data is essential for maintaining privacy in a digital landscape. Whether you’re an individual or a business, prioritizing data protection and ethical sharing ensures a safer online environment.

    If you’re concerned about your digital footprint, we specialize in privacy solutions to help safeguard your personal information. Contact us today to learn more about securing your online presence.

  • Can My Data Be Removed from the Dark Web?

    Can My Data Be Removed from the Dark Web?

    Protecting Personal Data in the Digital Age: Understanding the Dark Web and Staying Safe

    In today’s interconnected world, safeguarding personal data is more crucial than ever. Among the hidden corners of the internet, the dark web poses a significant threat, often serving as a marketplace for stolen information. Due to its decentralized and anonymous nature, retrieving compromised data is incredibly difficult.

    This article explores the complexities of removing data from the dark web, proactive steps for protecting your personal information, and additional strategies to enhance your overall online security.

    What Is the Dark Web and How Does It Work?

    The dark web is a concealed part of the internet, inaccessible through standard search engines. Special tools—like Tor (The Onion Router)—are required to browse dark web sites, providing users with a high degree of anonymity. While this privacy can be beneficial for legitimate purposes, such as secure communications, it is also exploited for cybercrime, including data trafficking.

    Key Differences Between the Surface Web, Deep Web, and Dark Web

    • Surface Web: The publicly accessible part of the internet, indexed by search engines.
    • Deep Web: Private and unindexed content, including medical records, databases, and secured sites.
    • Dark Web: Intentionally hidden sites operating via encrypted networks, often used for illicit activities.

    Once data is leaked onto the dark web, its decentralized structure makes removal nearly impossible. The next section explores why data is difficult to eliminate and what steps you can take to protect yourself.

    Can Data Be Removed from the Dark Web?

    Eliminating personal data from the dark web is extremely challenging. Information spreads rapidly among cybercriminals, often copied and resold, making total removal unrealistic. While data retrieval is nearly impossible, there are proactive measures you can take to minimize risks and prevent future exposure.

    Challenges of Data Removal

    1. Decentralization: No central authority controls dark web sites, making takedown requests ineffective.
    2. Rapid Dissemination: Once information is leaked, it spreads across multiple forums and marketplaces.
    3. Lack of Legal Oversight: Many dark web sites operate outside conventional legal frameworks, limiting enforcement.

    Despite these hurdles, there are preventative strategies to secure your identity.

    Proactive Measures for Protection

    While removing exposed data is difficult, protecting yourself from further compromise is entirely possible. Consider these strategies:

    1. Enable Identity and Credit Monitoring

    Services like dark web scans can alert you if your information appears on illicit sites, allowing you to take immediate action.

    2. Strengthen Authentication Methods

    Use multi-factor authentication (MFA) and strong, unique passwords to reduce the risk of unauthorized access.

    3. Monitor Online Presence

    Regularly search for traces of your personal information and adjust privacy settings across social media and other platforms.

    In the next section, we’ll explore additional cybersecurity strategies to further safeguard your digital identity.

    Enhancing Digital Security: Protecting Personal Data Beyond the Dark Web

    A comprehensive approach to cybersecurity helps prevent data exposure across the entire internet—not just the dark web. Here are some essential measures:

    1. Remove Personal Data from Data Brokers

    Data brokers collect and sell information to advertisers and scammers. Services like Optery and Privacy Bee help automate the removal process.

    2. Implement Robust Security Practices

    • Use a Virtual Private Network (VPN) to mask your IP address.
    • Regularly update software to install the latest security patches.
    • Avoid public Wi-Fi networks for sensitive transactions.

    3. Educate Yourself About Cyber Threats

    Understanding common cyber risks empowers you to recognize and avoid scams before they happen.

    In the next section, we discuss critical steps to take if your personal data appears on the dark web.

    What to Do If Your Information Is Found on the Dark Web

    If you discover that your personal data is compromised, swift action is essential to minimize potential damage.

    Immediate Steps to Take

    1. Secure Online Accounts
      • Change passwords to strong, unique ones.
      • Enable multi-factor authentication to add an extra security layer.
    2. Monitor Financial and Identity Activity
      • Watch for unauthorized transactions.
      • Consider identity theft protection services.

    Long-Term Protective Strategies

    • Use a password manager to securely store credentials.
    • Sign up for data breach alerts to stay informed about future security threats.

    Protect Your Digital Future Today

    Cybersecurity is no longer optional—it’s a necessity in today’s digital landscape. Understanding the dark web and its risks is the first step in protecting your identity.

    If you’re concerned about data security or need professional assistance, contact us today for expert guidance. We can help you safeguard your personal information and stay ahead of cyber threats.

    This version enhances readability, sharpens the messaging, and ensures clarity while maintaining your original intent. Let me know if you’d like any further refinements!

  • How to Spot Hidden Malware On Your Devices

    How to Spot Hidden Malware On Your Devices

    Hackers often send emails with malware attachments. It’s crucial to avoid opening emails from unknown senders.

    What Are Signs of Hidden Malware?

    Malware can be elusive, but there are some telltale signs to watch for:

    Sluggish Device

    If your device is unusually slow, it might be infected with malware.

    Suspicious Pop-ups

    Unexpected pop-ups can indicate malware is present.

    High Data Usage

    If your internet speeds are slower or you’re using more data than usual, malware could be the culprit.

    How Can You Check for Malware?

    There are several methods to detect malware on your device:

    Use Antivirus Software

    Antivirus programs can scan your device for malware, identifying and removing harmful software.

    Check Your Apps

    Review all the apps on your device and delete any you don’t remember installing.

    Look at Task Manager

    On a computer, open Task Manager and look for programs that use a lot of resources or have unfamiliar names.

    Check Your Browser

    Inspect your browser extensions and remove any you don’t use or recognize.

    What to Do If You Discover Malware?

    If you suspect malware, don’t panic. Here’s what to do:

    Run a Full Scan

    Use your antivirus software to perform a full scan of your device.

    Update Your Software

    Ensure all your programs and operating system are up to date.

    Change Your Passwords

    Update the passwords for all your important accounts.

    Backup Your Data

    Back up your essential files to a secure location, such as a cloud service.

    How to Avoid Malware?

    Preventing malware is better than dealing with an infection. Here’s how:

    Keep Everything Up-to-Date

    Regularly update your operating system and applications.

    Be Careful What You Click

    Avoid clicking on links or downloading files unless you’re sure they’re safe.

    Use Strong Passwords

    Create long, complex passwords and use different passwords for each account.

    Use Antivirus Software

    Maintain good antivirus software on your device and run regular scans.

    Stay Safe Online!

    Malware can be intimidating, but you can protect yourself. Always be cautious online and keep your devices secure. If you need help with malware or want to learn more about online safety, contact us today. We’re here to help you stay safe in the digital world!

  • How to Minimize Ransomware Damage

    How to Minimize Ransomware Damage

    Ransomware has become a significant problem for many individuals and businesses. It can lock up your files and demand payment to release them. This article will guide you on how to protect yourself from ransomware and what to do in case of an attack.

    What is Ransomware?

    Ransomware is a type of malicious software that infiltrates your computer, locks your files, and demands payment to unlock them. This can be both frightening and costly.

    How does ransomware work?

    Ransomware typically enters through email or malicious websites and can spread through networks. Once inside, it encrypts your files with strong codes, and you receive a message demanding payment.

    How does Encryption Work?

    Encryption uses algorithms and keys. An algorithm is a set of rules for solving problems, and a key is like a password that unlocks the encrypted message.

    How can you prevent ransomware attacks?

    There are several ways to prevent ransomware before it causes harm. Here are some key steps:

    Keep your software up to date

    Always keep your computer and programs updated. Updates often fix vulnerabilities that ransomware exploits.

    Use good antivirus software

    Invest in strong antivirus software, keep it turned on, and ensure it is updated. It can detect many types of ransomware.

    Be careful with emails

    Avoid opening emails from unknown senders and do not click on links or download files unless you are certain they are safe.

    Back up your files

    Regularly back up your most important files and store them on a separate device. This way, if ransomware locks your files, you will still have copies.

    What do you do if you get ransomware?

    If you suspect you have ransomware, don’t panic. Here’s what to do:

    Disconnect from the network

    Immediately disconnect your computer from the internet to prevent the ransomware from spreading or worsening.

    Don’t pay the ransom

    Experts advise against paying the ransom as there is no guarantee you will get your files back, and paying encourages more attacks.

    Report the attack

    Report the attack to the police and your country’s cybersecurity center. They can assist and use the information to prevent future attacks.

    Use your backups

    If you have backups, restore your files from them. That’s what backups are for, after all.

    How can businesses protect themselves?

    Businesses should take additional steps to stay safe. Here are some suggestions:

    Train your employees

    Educate your employees about ransomware, providing examples of what to watch out for and what to do if they encounter something suspicious.

    Limit access to key files

    Restrict access to essential files to only those who need it for their job. This can limit the spread of ransomware.

    Have a plan ready

    Develop a strategy in case of a ransomware attack and practice it. Preparation will help you respond swiftly and contain the damage.

    How is ransomware evolving?

    Ransomware is constantly developing new tricks. Be aware of these:

    Attacks on phones and tablets

    Ransomware can now target not only computers but also phones and tablets. Be cautious with all your devices.

    Double extortion

    Some ransomware now steals your data before locking it and then threatens to release your private information if you don’t pay, making the attack even worse.

    Attacks on cloud services

    As more people use cloud storage, ransomware has started targeting these services. Ensure your cloud accounts are secure.

    Stay Safe and Prepared

    Ransomware is a serious threat, but you can protect yourself by keeping your software updated, being cautious online, and always having backups. If you run a business, train your team and have a solid plan. Stay alert and ready.

    Don’t try to face ransomware alone. Contact us if you need help with ransomware or have additional questions.

  • The Ransomware Werewolf – When Your Systems Are Held Hostage

    Full moon rising, systems slowing, files vanishing… your network has been infected, and it’s turning into something monstrous. It’s the ransomware werewolf, prowling the night, holding your data hostage until you pay up. This IT nightmare is a terrifying transformation that no business wants to endure. But fear not—there are ways to keep your systems from howling at the moon. 🌕🐺

    The Nightmare
    Ransomware attacks are vicious, sudden, and leave your data locked away behind a digital cage. Once infected, your files are encrypted, and the only way to get them back (without a proper backup) is to pay a hefty ransom. Even then, there’s no guarantee you’ll see your data again. It’s like trying to strike a deal with a werewolf—you might lose your data or even your network security. 🧛‍♂️🖥️

    How to Avoid the Transformation

    1. Silver Bullet Solutions: Keep your software updated. Outdated systems are like leaving your windows open on a stormy night—an open invitation for trouble. 🔧💻
    2. Cursed Email Filters: Use advanced spam filters to block suspicious emails from entering your system. If it looks like a trick, don’t treat it. 🎃🚫
    3. The Silver-Lined Cloud: Use cloud services to back up your critical data. Even if the werewolf attacks, you’ll have a safe copy ready to go. ☁️✨
    4. Beware of the Bite: Train your team to spot suspicious activity and report it immediately. Often, the first sign of ransomware is a slow network, unexplained pop-ups, or encrypted files. 🕵️‍♂️🔍

    Ransomware is no myth, but you don’t have to be afraid. At Invincia Technologies, we provide silver-bullet solutions to protect your business from IT werewolves and other digital beasts. From antivirus protection to backup solutions, we ensure that your systems are always safe and sound—even when the full moon rises. 🌕💪

    Avoiding these Halloween IT nightmares is as simple as partnering with the right experts. Want to learn more? Contact us, and we’ll make sure your business sleeps soundly through the night. 🏢🛡️

    Until next time… keep the lights on. 💡

  • The Phantom Data Breach – A Tale of Unseen Threats

    On a dark and stormy night, as your business hums along quietly, an unseen force sneaks into your network, siphoning off valuable data. It’s the phantom of the data breach, a sinister specter that lurks in the shadows, waiting to strike when you least expect it. Unfortunately, this isn’t just a Halloween story—it’s a very real IT nightmare that can happen to businesses of all sizes. Let’s shine a flashlight on these creepy crawlers and uncover how to banish them before they haunt your system. 🔦🕷️

    The Nightmare
    Data breaches are like ghouls; you never know when they’ll appear. They’re sneaky, silent, and can wreak havoc on your business if you’re not prepared. Whether it’s stolen customer information, leaked trade secrets, or compromised financial data, a breach can result in financial loss, damaged reputation, and even legal penalties. Imagine waking up to find your data sold on the dark web—chilling, right? 🕸️

    How to Avoid the Curse

    1. Eerie Encryption: Keep data safe with strong encryption. If a hacker tries to grab your data, it’ll be as useless as an ancient scroll without a cipher key. 🗝️
    2. Beware the Phishing Zombies: Educate your staff to avoid suspicious links and attachments, no matter how tempting they may seem. Those emails promising free candy are just a trap! 🍬🧟‍♂️
    3. Ghostly Backups: Regularly back up your data and store it in a secure location. Even if your system is haunted by a breach, you’ll have the means to resurrect your data and carry on. 👻🔄
    4. Summon the Firewall: Ensure your firewall is up to date and strong enough to keep the monsters at bay. It’s your first line of defense against the undead of the cyber world. 🔥🧱

    Don’t let your business fall victim to the phantom data breach! At Invincia Technologies, we ward off digital ghouls and keep your data secure. Our cybersecurity experts are the ultimate ghost hunters, banishing breaches and keeping your IT environment safe from things that go bump in the night. 💻🔒

    Stay tuned for our next Halloween IT nightmare… if you dare. 😈🎃

  • Don’t Be a Victim – Common Mobile Malware Traps

    Don’t Be a Victim – Common Mobile Malware Traps

    Your smartphone is like a digital Swiss Army knife acting as your wallet, communication center, and personal assistant all in one. It holds valuable data, from bank details to private photos, making it a prime target for cybercriminals. Yet, mobile security often gets overlooked, with most people focusing on protecting their computers instead.

    In 2023, attacks on mobile devices surged by 50% compared to the previous year. Hackers haven’t ignored mobile devices they’re laying traps to infect them with malware. Let’s explore some common mobile malware traps and how to avoid them.

    Common Mobile Malware Traps

    Mobile malware, much like computer malware, is harmful software designed to damage your device or steal your data. It can appear in various forms, such as fake apps or malicious links. Awareness is key to protecting yourself from these threats.

    1. Phishing Attacks: The most common type of malware. You receive a convincing-looking email or text that tricks you into clicking a link or downloading an attachment, leading to malware infection.
    2. Malicious Apps: Not all apps are safe. Some hide malware designed to steal your data, show ads, or even take control of your device. Always research apps before downloading.
    3. SMS Scams (Smishing): These scams use text messages to trick you into sharing personal information or clicking malicious links. Be cautious of unexpected messages asking for sensitive info.
    4. Wi-Fi Risks: Public Wi-Fi networks are usually unsecured, making them easy targets for hackers. Avoid accessing sensitive information when connected to public Wi-Fi.
    5. Fake Apps: These are apps that mimic legitimate ones but are designed to steal your login credentials or personal information. Verify app authenticity before downloading.
    6. Adware: Though less harmful, adware can be annoying and might expose you to more threats. It often comes bundled with other apps.

    Protect Yourself: Key Tips

    • Stay Updated: Ensure your phone’s operating system and apps are always up-to-date by installing the latest security patches or enabling automatic updates.
    • Be Cautious with Links and Attachments: Avoid clicking on links or downloading attachments from unknown sources.
    • Use Strong Passwords: Create strong passwords for your phone and apps. A password manager can help you keep track of them.
    • Stick to Official App Stores: Download apps only from trusted sources like Google Play or the Apple App Store. Check reviews and app permissions before installing.
    • Avoid Public Wi-Fi: When connecting to public Wi-Fi, use a VPN to encrypt your data.
    • Regular Backups: Back up your phone regularly to prevent data loss.
    • Security Software: Consider installing a reliable mobile security app for added protection.

    Additional Steps to Secure Your Smartphone

    Physical Security

    • Lock Your Phone: Set a strong passcode, or use fingerprint or facial recognition. Avoid easy-to-guess patterns.
    • Avoid Public Charging Stations: These can be compromised and allow hackers to access your device.
    • Remote Wipe: If your phone is lost or stolen, remotely wipe its data to protect your sensitive information.

    App Permissions

    • Review App Permissions: Check the permissions apps request and deny any that seem unnecessary. For example, a flashlight app doesn’t need access to your contacts.
    • Conduct App Audits: Regularly go through the apps on your phone and uninstall any you no longer use to minimize vulnerabilities.

    Data Backup

    • Cloud Backups: Regularly back up your important files using cloud storage, ensuring you have copies even if your phone is lost or damaged.
    • Local Backups: Consider backing up your phone to your computer for an extra layer of protection.

    Take Control of Your Mobile Security

    By following these best practices, you can greatly improve the security of your smartphone. Remember, it’s always easier to prevent an issue than to fix one. Stay alert, informed, and proactive to keep your digital life safe.

    While smartphones offer incredible convenience, they’re also appealing targets for cybercriminals. By staying aware of the risks and taking protective measures, you can enjoy the benefits of mobile technology without compromising your security.

    Contact Us to Strengthen Your Mobile Security

    Many employees use their personal devices for work, which means mobile malware can affect more than just one individual it can lead to a company-wide data breach. Be proactive in securing mobile devices. Our experts can provide tailored solutions to protect all your devices.

    Reach out today to discuss mobile device protection for your home or office.

  • Hackers Hit By Pandemic, Start Auctioning Data

    Cybercriminal businesses have seen a hit from the weakened economy. In response, they’re further morphing tactics to extract money.

    Times are tough.

    Cybercriminals are getting creative.

    We’ve seen several stories of Ransomware groups releasing stolen data to force ransom payment (like here). Some have even formed a cartel to expand reach and revenue (like here). Now, they’ve added a new line of revenue from victim data.

    The criminal group behind the REvil ransomware enterprise has begun auctioning off sensitive data stolen from companies hit by its malicious software.

    Many Ransomed organizations are either unwilling or unable to pay Ransom demands. This could be in following law enforcement guidance or they simply don’t have the funds in this tough economy. Unfortunately, this has consequences.

    “The problem is a lot of victim companies just don’t have the money [to pay ransom demands] right now.”

    When ransom demands aren’t met, the REvil team is now exacting their tolls via data auctions.

    Experts say the auction is a sign that ransomware groups may be feeling the financial pinch from the current economic crisis, and are looking for new ways to extract value from victims

    On the block in their first auction, the REvil team is selling data from a Canadian agricultural producer who has reportedly not paid their Ransom demand.

    The victim firm’s auction page says a successful bidder will get three databases and more than 22,000 files stolen from the agricultural company.

    Cybercriminals have been printing money (figuratively) through these attacks, and they don’t seem to be stopping.

    “Others are now charging a fee not only for the ransomware decryptor, but also a fee to delete the victim’s data. So it’s a double vig.”

    This is yet another dark turn in the Ransomware game. As much as we don’t want to admit it, these criminals are crafty and smart.

    It’s time to protect your team and your assets from these attacks.

    Are you ready to take action?
    You already have a lot on your plate, so we make it easy. Find out how to protect your team with Invincia’s Automated Security Awareness platform.

    To get a quote, set up a call with our team here!

    Original article here.
    [https://krebsonsecurity.com/2020/06/revil-ransomware-gang-starts-auctioning-victim-data/]

  • Attack Campaign Using Fake Browser Updates to Deliver Ransomware and Banking Malware

    Researchers observed an attack campaign distributing fake browser updates to infect website visitors with ransomware and banking malware.

    Sucuri reported that the attackers inject either links to an external script or the entire script code into a compromised webpage. In both cases, this code creates a message box informing the user that a critical error resulted from an outdated version of the web browser. It then prompts the visitor to update his or her browser version while displaying garbled text in the background to legitimize the appearance of a critical browser vulnerability.

    If the user clicks the “Update” button within the message box, the computer downloads a ZIP archive. This resource harbors a JavaScript file with a name that mentions “browser” and “components,” an apparent attempt to further convince the user that it is legitimate.

    Once run, the file tries to download browser.jpg, which is actually a Windows EXE file containing ransomware. By comparison, the Android version of this campaign downloads banking malware onto the infected device.

    A Long History of Fake Browser Updates

    The tactic of using fake browser updates to deliver malware goes back to at least 2012, when Trend Micro discovered several websites offering fake, malware-laden updates for popular web browsers. A year later, ThreatTrack Security Labs came across fake upgrades hosted on an online repository.

    The tactic has also been active in recent years. In 2017, for example, Proofpoint discovered a malvertising attack that used fake browser updates to deliver the Kovter ad fraud malware. Malwarebytes Labs came across something similar when it uncovered the FakeUpdates malware campaign in November 2018.

    How to Defend Against Banking Malware and Ransomware

    Security professionals can help defend against banking malware and ransomware by taking a risk-based approach to patch management, which can help them decide whether to patch known component vulnerabilities or replace at-risk items with more secure ones. Security teams should also invest in a solution that delivers phishing intelligence about ongoing attack campaigns, which helps responders determine which indicators pose the greatest risk to the organization’s environment.


    Contributing Editor

    David Bisson is an infosec news junkie and security journalist. He works as Contributing Editor for Graham Cluley..
    https://securityintelligence.com/news/attack-campaign-using-fake-browser-updates-to-deliver-ransomware-and-banking-malware/