Three ransomware attacks from last week caused notable disruptions on institutions from different public sectors, namely on an energy company, a law enforcement agency, and several public schools.
The GandCrab gang might be back to their old tricks. Various security researchers reported that the group might be responsible for releasing a more advanced ransomware variant called Sodinokibi.
A newly uncovered ransomware family was found targeting QNAP network-attached storage (NAS) devices. Named eCh0raix, the malware was reportedly designed for targeted ransomware attacks.
The relatively new ransomware Sodinokibi is already using an array of vectors to infect victims. Aside from using spam and phishing emails, the group behind this malware continues to add more delivery methods to their arsenal.
Baltimore City and County governments, Ohio-based NEO Urology, and Talley Medical Surgical Eyecare in Indiana are still in recovery efforts after ransomware incidents caused daily operations to be temporarily suspended.
The ransomware evolution continues: 2019 data shows changes in volume of threats and a shift in targets. New evasion techniques and distribution methods are also being deployed by malware creators.
Security researchers saw a spate of attacks targeting Windows servers running unsecure or misconfigured MySQL databases to infect them with the GandCrab ransomware.
Ransomware's persistence is perhaps best embodied by a relatively new breed of ransomware, Ryuk, which has been making waves recently with multiple incidents occurring over the past year.