Home » Ransomware attack

Ransomware attack

Fight Back Against the Rise of Ransomware in SA with EDR Solutions

When cyberattacks are on the rise, as they certainly have been in South Africa this year, an organisation cannot afford to have its cybersecurity operating in a reactive manner. And yet, far too many businesses operate in this manner, making them prime targets for a breach. This is according to Milad Aslaner, Senior Director, Cyber Defense Strategy at SentinelOne, which helps organisations to prevent, detect, respond to and remediate end-point threats using artificial intelligence (AI) and machine learning. Its endpoint security products are distributed throughout Africa by Networks Unlimited. Aslaner explains: “Endpoints including laptop computers, tablets, and phones provide entry points to a wider network penetration that could harm the organisation, and which is one of the goals of ran...

African Bank Warns of Data Breach After Partner Struck by Ransomware

Image sourced from Redefine. South African retail bank African Bank has confirmed that one of its debt recovery partners, Debt-IN, was targeted by a ransomware attack in April 2021. At that time, advice from security experts concluded that there was no evidence that the attack had resulted in a data breach, however now BusinessTech reports that Debt-IN has become aware that personal data of certain customers, including a number of African Bank Loan customers who had been under debt review at the time, has been compromised by the threat actors. In response, African Bank says that it is confident that no data shared after the 1 April attack has been compromised. “A robust mitigation plan has been implemented by Debt-IN to contain and reduce any further adverse impact,” the lender said. “We h...

How to Successfully Recover from a Ransomware Attack

Sourced from Kaspersky South Africa is an attractive target for cybercriminals for a number of reasons, and the last few years have seen a sharp rise in high-profile ransomware attacks. One of the key motivations driving this volume of attacks is the fact that data is a de facto currency and an extremely valuable commodity on the black market. While backup is a critical component of data protection, when this backup is also encrypted by malicious software, companies are often left with few options other than to pay the ransom. Therefore, an effective Cyber Recovery strategy, which enables businesses to get back up and running without having to give in to criminal demands, is the key. Ransomware on the Rise The rapid adoption of digital transformation, Artificial Intelligence (AI) and the I...

Transnet Undergoes Apparent Ransomware Hack

Image sourced from News24. South Africa’s logistics and port operator Transnet has been the victim of an apparent ransomware attack, with its IT systems, websites and Navis container terminal OS going offline yesterday morning. The hack was first identified when several stakeholders in the freight industry were not able to access the container terminals at the Durban port in KwaZulu-Natal (KZN). “There was a memo issued to staff on Thursday morning that their terminal computers had been hacked and it came from the Transnet IT system. They said that they were working on it, but by Thursday afternoon the system was still offline,” said one stakeholder, quoted by The Sowetan. “Some operations, including rail, has gone manual but the end result is that no import containers are able to be proce...

11 Critical Steps Security Officers Need to Take During a Ransomware Attack

Sourced from Kaspersky Ransomware attacks have increased in volume, morphing and evolving through the years, especially recently, into the debilitating attacks we see today. According to a recent Global Threat Landscape Report from FortiGuard Labs, ransomware attacks increased sevenfold in the last half of 2020 and became even more disruptive. Recently, a massive ransomware attack on IT services provider Kaseya resulted in widespread threats against companies across 17 countries. Tactics from threat actors continue to shift and defenders need to not only continue to get the “basics” of defensive strategies correct but continuously evaluate their own organisation’s security policies to ensure they still provide adequate responses against today’s ransomware threat actors. CISOs are...

Microsoft Acquires Cybersecurity Startup RiskIQ as Ransomware Threat Looms

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent. You Deserve to Make Money Even When you are looking for Dates Online. So we reimagined what a dating should be. It begins with giving you back power. Get to meet Beautiful people, chat and make money in the process. Earn rewards by chatting, sharing photos, blogging and help give users back their fair share of Internet revenue.

5000 Attack Attempts in 22 Countries Due to REvil Ransomware Campaign

Image sourced from Forbes. On 2 July 2021, it became known that the REvil ransomware gang perpetrated a large attack against Managed Service Providers (MSPs) and their clients around the world. The far-reaching attack affected firms across 22 countries, including South Africa, the UK, Canada, Argentina, Mexico and Spain, amongst others. This led to thousands of companies becoming potential victims of ransomware. At the moment of writing, Kaspersky reports that their researchers have already observed over 5000 infection attempts in Europe, North and South America. REvil Ransomware Group REvil (aka Sodinokibi) is one of the most prolific ransomware-as-a-service (RaaS) operators that first surfaced in 2019, and made numerous headlines in the past few months due to the targets they hit and the...

Inside the Mind of Cybercriminals – How Threat Actors Think

Cybercriminals come in many different flavours, but the majority of them are in it for one thing: financial pay-off. They want the money that comes with offering their tools or services, selling stolen data, extortion like ransomware or plain fraud. And they all have one thing in common – your organisation is on their radar. This is why, says Anna Collard, SVP Content Strategy and Evangelist at KnowBe4 Africa, it is critical to understand how cyber criminals operate, the tools they use and the approaches they take to embed robust security within the organisation. “With ransomware going rampant and victim organisations paying up to millions of U.S. dollars to the extortionists, this problem is just going to get worse. The U.S. government recently announced that ransomware is a national cybe...

Joe Biden pointedly asks Vladimir Putin about cyberattacks at summit

U.S. President Joe Biden asked Russian President Vladimir Putin on Wednesday how he would feel if someone carried out a ransomware attack on Russian oil pipelines, a pointed question during their summit that illustrated the breadth of their disagreements. The query referred to a cyberattack that closed the Colonial Pipeline Co system for several days in May, preventing millions of barrels of gasoline, diesel and jet fuel from flowing to the U.S. East Coast from the Gulf Coast. Both leaders described their first summit in a lakeside Swiss villa as professional, rather than friendly, and said they agreed to hold lower-level talks on cybersecurity and arms control and to send their ambassadors back to their capitals. But there was no hiding their differences on issues such as human rights, wh...

Ireland’s health service IT systems shut down by ransomware attack

Ireland’s health service said it was under a ransomware attack on Friday that forced it to shut down its computer systems. A ransomware attack locks users out of their computer systems until they pay a fee to the intruder. There were few details, but the attack was described as significant by Ireland’s Health Service Executive. Motorists line up for fuel at one of the few remaining gas stations that still has fuel in Arlington, Virgina, on May 13, 2021. AFPBiden says oil pipeline back in operation after cyber attack It said it was shutting down all its IT systems to protect them from the attack while it consulted security partners. Covid-19 vaccinations would still go ahead as planned, the agency said. “We apologise for inconvenience caused to patients and to the public and will give furth...

6 Ways to Protect Your Business from Ransomware

With an ever-growing number of people working from home, primarily due to the global COVID-19 pandemic, cybersecurity attacks are on the rise, meaning that dealing with security risks is an ongoing journey for enterprises. IDC predicts that by 2023, 60% of data will be generated at the edge by people working from home and from devices outside of the corporate firewall. While at the same time, many corporate cloud services are already being rendered from locations outside the data centre. This has given rise to ransomware attacks as many employees who are working remotely have their firewalls and access points configured to allow remote access. With that in mind, here are 6 things Kaspersky experts recommend to protect your company from ransomware: Always keep software updated on all t...

Apple Reportedly Targeted in $50 Million Ransomware Attack

Apple Inc has reportedly suffered a ransomware attack at the hands of REvil operators. The hackers have revealed that the tech company has until 1 May to pay the ransom or risk losing confidential drawings and gigabytes of personal data. “Our team is negotiating the sale of large quantities of confidential drawings and gigabytes of personal data with several major brands,” says REvil operators. “We recommend that Apple buy back the available data by May 1.” According to The Record, the REvil gang asked for a $50 million ransom demand, similar to the sum they requested from laptop maker Acer last month. Denis Legezo, Senior Security Researcher for Kaspersky’s Global Research and Analysis Team, says “REvil ransomware has been known since 2019 and it can both encrypt data and steal it. I...

  • 1
  • 2