Skip to main content

Warning: Russian hackers may be trying to target you with ransomware. Here’s how

Russian hackers are trying to take advantage of the millions of employees working from home because of shelter-in-place orders.

Security firm Symantec said this week that it had discovered and then notified businesses that the Russian hacking group Evil Corp has been targeting remote employees with so-called ransomware attacks.

In a typical ransomware attack, criminals sends victims an email—often created to look like it’s from a colleague—that contains a link to a malicious site. When users accesses the fraudulent site, criminals can then take over their computers and demand payment—typically in cryptocurrency like Bitcoin—to regain control of their devices.

In the case of Evil Corp’s ransomware attack, Symantec said the hackers wanted to “cripple” a company’s “IT infrastructure by encrypting most of their computers and servers in order to demand a multimillion dollar ransom.”

Symantec said that 31 U.S.-based organizations were compromised in the latest series of attacks, “eight of which are Fortune 500 companies.” The security firm did not reveal the names of the impacted organizations nor whether they paid any ransoms. The security firm said that while the hackers “breached the networks of targeted organizations,” the criminals were only “in the process of laying the groundwork for staging ransomware attacks,” implying that they didn’t complete their intended extortion plans. 

This recent hacking attempt used a specific type of ransomware known as WastedLocker, which Symantec said was developed by Evil Corp. Two of Evil Corp’s alleged members have been previously charged by the U.S. Department of Justice for a separate “decade-long cybercrime spree” affecting unspecified banks and financial firms, Symantec said.

Eric Chien, Symantec’s technical director, said in an interview with The New York Times, that hackers were able to launch ransomware attacks on workers via malware that “was deployed on common websites and even one news site,” without describing those compromised websites containing the malicious code. From those compromised websites, users inadvertently download a bogus software update that installs the malware onto their computers.

That malware inspects people’s computers to see if they have installed a corporate virtual private network, or VPN, that businesses typically require their remote employees to use in order to access sensitive corporate data. The malware learns the name of the employee’s company from the VPN and is then able to infect people’s computers once those workers visit another website. 

“Once the machine is reconnected to the corporate network, the code is deployed, in hopes of gaining access to corporate systems,” the Times said.

More must-read tech coverage from Fortune:



from Fortune https://ift.tt/3i6XqWg

Comments

Popular posts from this blog

With Trump’s WeChat ban approaching, here are several alternatives

Our mission to help you navigate the new normal is fueled by subscribers. To enjoy unlimited access to our journalism,  subscribe today . WeChat, China’s most popular app, faces an imminent ban in the U.S. , leaving many of its users in a bind. The White House said Friday it would prohibit WeChat , owned by Beijing-based Tencent, from appearing in U.S. app stores starting Sunday at midnight.  Though WeChat has a comparatively minor U.S. presence, it remains a major conduit for communications between Chinese nationals living abroad and their friends and family back home . The app has an average of 19 million million daily active users in the U.S. versus more than a billion worldwide.  WeChat, called Weixin in China, is effectively the operating system for people’s digital lives in China. They use it to pay for services, hail cabs, go shopping, read news, chat, and more. For people seeking to bridge the digital divide between the U.S. and China, WeChat is not easily re...