Advertisment
Sunday, June 26, 2022
  • Home
  • About Us
  • Contact Us
  • TNG Board
  • TNG Investigation
  • Login
TheNewsGuru
  • Home
  • Trending
  • News
    • Nigeria
    • World
  • Politics
  • Entertainment
  • Sports
    • Football
  • Business News
  • Technology
No Result
View All Result
TheNewsGuru
  • Home
  • Trending
  • News
    • Nigeria
    • World
  • Politics
  • Entertainment
  • Sports
    • Football
  • Business News
  • Technology
No Result
View All Result
TheNewsGuru
No Result
View All Result

Home » Tech » New ransomware attacking organisational networks discovered

New ransomware attacking organisational networks discovered

Ediri Oyibo by Ediri Oyibo
5 months ago
in Tech, Technology
Reading Time: 2 mins read
549 35
A A
0
285
SHARES
1.5k
VIEWS
 

A new ransomware that targets organisational networks has been discovered by the Nigerian Computer Emergency Response Team’s (ngCERT).

The Nigerian Communications Commission (NCC) made this known in a statement released by its Director, Public Affairs, Dr. Ikechukwu Adinde.

According to the statement, a cybercrime group perfected the new year scheme to deliver ransomware to targeted organizational networks.

RecommendedReads

Alleged cybercrime: Police arrest 5 in Bauchi

Alleged cybercrime: Police arrest 5 in Bauchi

4 weeks ago
1.5k
EFCC goes after MD of Mobil Nigeria over alleged $213 million fraud

EFCC nabs 24-year old owner of yahoo yahoo academy, 16 trainees

1 month ago
1.6k

The new ransomware uncovered by security experts has been categorised, by ngCERT advisory released over the weekend as high-risk and critical.

According to the ngCERT advisory, the criminal group is said to have been mailing out USB thumb drives to many organisations in the hope that recipients will plug them into their PCs and install the ransomware on their networks.

While businesses are being targeted, criminals could soon begin sending infected USB drives to individuals.

Describing how the cybercrime group runs the ransomware, the ngCERT advisory says the USB drives contain so-called ‘BadUSB’ attacks.

The BadUSB exploits the USB standards versatility and allows an attacker to reprogram a USB drive to emulate a keyboard to create keystrokes and commands on a computer.

It then installs malware prior to the operating system booting, or spoofs a network card to redirect traffic.

Numerous attack tools are also installed in the process that allows for exploitation of personal computers (PCs), lateral movement across a network, and installation of additional malware.

The tools were used to deploy multiple ransomware strains, including BlackBatter and REvil.

According to ngCERT, the attack has been seen in the US where the USB drives were sent in the mail through the Postal Service and Parcel Service.

One type contained a message impersonating the US Department of Health and Human Services and claimed to be a COVID-19 warning.

Other malicious USBs were sent in the post with a gift card claiming to be from Amazon.

However, ngCERT has offered recommendations that will enable corporate and individual networks to mitigate the impact of this new cyber attack and be protected from the ransomware.

These recommendations include a call on individuals and organisations not to insert USB drives from unknown sources, even if they’re addressed to you or your organization.

In addition, if the USB drive comes from a company or a person one is not familiar with and trusts, it is recommended that one contacts the source to confirm they actually sent the USB drive.

Finally, ngCERT has advised Information and Communication Technology as well as other Internet users to report any incident of system compromises to ngCERT via [email protected], for technical assistance.

Author

  • Ediri Oyibo

    View all posts

Tags: BadUSBCybercrimengCERTRansomware
SendShare114Tweet71
Previous Post

Armed Forces Remembrance Day: Military widows beg Buhari for support

Next Post

Olubadan-in-Council to present Balogun to Makinde as next Olubadan – Ladoja

Related Contents

IT firm, Zoho opens office in Nigeria to help small businesses
Tech

IT firm, Zoho opens office in Nigeria to help small businesses

11 hours ago
1.4k
Tech

BREAKING: Nigeria to start rolling out 5G services from August

2 days ago
1.6k
Reuben Muoka appointed NCC’s Director of Public Affairs
Tech

Reuben Muoka appointed NCC’s Director of Public Affairs

3 days ago
1.5k
Load More
Next Post
Ladoja reacts to controversy around Olubadan stool

Olubadan-in-Council to present Balogun to Makinde as next Olubadan - Ladoja

AFRD: Fallen soldiers made supreme sacrifice for Nigeria's unity - Gov Sanwo-Olu

AFRD: Fallen soldiers made supreme sacrifice for Nigeria's unity - Gov Sanwo-Olu

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

A new ransomware that targets organisational networks has been discovered by the Nigerian Computer Emergency Response Team's (ngCERT). The Nigerian Communications Commission (NCC) made this known in a statement released by its Director, Public Affairs, Dr. Ikechukwu Adinde. According to the statement, a cybercrime group perfected the new year scheme to deliver ransomware to targeted organizational networks. The new ransomware uncovered by security experts has been categorised, by ngCERT advisory released over the weekend as high-risk and critical. According to the ngCERT advisory, the criminal group is said to have been mailing out USB thumb drives to many organisations in the hope that recipients will plug them into their PCs and install the ransomware on their networks. While businesses are being targeted, criminals could soon begin sending infected USB drives to individuals. Describing how the cybercrime group runs the ransomware, the ngCERT advisory says the USB drives contain so-called 'BadUSB' attacks. The BadUSB exploits the USB standards versatility and allows an attacker to reprogram a USB drive to emulate a keyboard to create keystrokes and commands on a computer. It then installs malware prior to the operating system booting, or spoofs a network card to redirect traffic. Numerous attack tools are also installed in the process that allows for exploitation of personal computers (PCs), lateral movement across a network, and installation of additional malware. The tools were used to deploy multiple ransomware strains, including BlackBatter and REvil. According to ngCERT, the attack has been seen in the US where the USB drives were sent in the mail through the Postal Service and Parcel Service. One type contained a message impersonating the US Department of Health and Human Services and claimed to be a COVID-19 warning. Other malicious USBs were sent in the post with a gift card claiming to be from Amazon. However, ngCERT has offered recommendations that will enable corporate and individual networks to mitigate the impact of this new cyber attack and be protected from the ransomware. These recommendations include a call on individuals and organisations not to insert USB drives from unknown sources, even if they’re addressed to you or your organization. In addition, if the USB drive comes from a company or a person one is not familiar with and trusts, it is recommended that one contacts the source to confirm they actually sent the USB drive. Finally, ngCERT has advised Information and Communication Technology as well as other Internet users to report any incident of system compromises to ngCERT via [email protected], for technical assistance.
No Result
View All Result
  • Home Page
  • Columnist
  • News
    • National
    • World
  • TNG Investigations
  • Politics
  • Business
  • Entertainment
  • Tech

© 2021 Thenewsguru.com

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
We use cookies to offer you a better browsing experience. If you continue to use this site, you consent to our use of cookies.
I Accept Cookies
We use cookies to offer you a better browsing experience. If you continue to use this site, you consent to our use of cookies.
I Accept Cookies